| asymmetric algorithm | passcode |
| brute force attack | password |
| chosen plaintext attack | password cracking |
| cipher | plaintext |
| ciphertext | private key algorithm |
| cryptography | public key algorithm |
| decrypt | social engineering |
| dictionary attack | substitution cipher |
| encrypt | symmetric algorithm |
| hybrid attack | user ID |
| known plaintext attack |