Match each item with a statement below.

A. The hiding of messages in such a way that no one but the sender and intended recipient of the message even knows a message exists
B. An encryption method or process encompassing the algorithm, key(s) and/or cryptovariable(s), and procedures used to perform encryption and decryption
C. The process of rearranging plaintext values to form ciphertext
D. The encoded message resulting from an encryption
E. To encrypt, encode, or convert plaintext into the equivalent ciphertext
F. The process of replacing plaintext values with other values to form ciphertext
G. To decrypt, decode, or convert ciphertext into the equivalent plaintext
H. The programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represents the message
I. The process of converting components (words or phrases) of an unencrypted message into encrypted components

A. Steganography
B. Cryptosystem
C. Transposition
D. Cryptogram
E. Encipher
F. Substitution
G. Decipher
H. Algorithm
I. Code

Computer Science & Information Technology

You might also like to view...

A(n) ________ is the changeable input value used in a what-if analysis

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ command displays arrows that indicate what cells are affected by the value of the selected cell

Fill in the blank(s) with correct word

Computer Science & Information Technology