Across
- 4. : Transposition cipher also called a zigzag cipher
- 6. : Malware that can reproduce itself
- 7. : A monoalphabetic rotation cipher used by Gaius Julius Caesar
- 8. : Data after encryption
- 9. : Scrambles data to prevent unauthorized access
- 10. : Modifying the information in some way by conducting some process on the information
Down
- 1. : This is a relentless attack based on trial and error where the hacker attempts to determine passwords or access encrypted data
- 2. : In this attack the attackers already have a copy of the encrypted message
- 3. : Involves using a single key to encrypt and decrypt data
- 5. : Probably the best-known example of a polyalphabetic cipher
