Cryptography Techniques

12345678910
Across
  1. 4. : Transposition cipher also called a zigzag cipher
  2. 6. : Malware that can reproduce itself
  3. 7. : A monoalphabetic rotation cipher used by Gaius Julius Caesar
  4. 8. : Data after encryption
  5. 9. : Scrambles data to prevent unauthorized access
  6. 10. : Modifying the information in some way by conducting some process on the information
Down
  1. 1. : This is a relentless attack based on trial and error where the hacker attempts to determine passwords or access encrypted data
  2. 2. : In this attack the attackers already have a copy of the encrypted message
  3. 3. : Involves using a single key to encrypt and decrypt data
  4. 5. : Probably the best-known example of a polyalphabetic cipher