asymmetric algorithm | passcode |
brute force attack | password |
chosen plaintext attack | password cracking |
cipher | plaintext |
ciphertext | private key algorithm |
cryptography | public key algorithm |
decrypt | social engineering |
dictionary attack | substitution cipher |
encrypt | symmetric algorithm |
hybrid attack | user ID |
known plaintext attack |