Concept cluster: Graphics and sound > Cryptography
n
(cryptography) A one way membership function.
n
(computing) An abbreviation that replaces a string of commands and thereby reduces typing when performing routine actions or tasks.
n
(Internet) A text caption, associated with an image or other element, that is rendered if the usual content cannot be rendered.
n
(rare) The encoding of messages in such a way that they are as easy as possible to decipher.
n
cryptography in which the key used in decryption is different from that used for encryption.
adj
(cryptography) autokey
adj
(cryptography) Being a cipher that incorporates the plaintext into the key.
n
(cryptography) A property of some cipher systems in which a small change in the input results in a very large change in the output.
n
(historical) A cryptologic process using an early form of Bayesian networks to infer information about the settings of the Enigma machine.
n
(cryptography) A covert method of decryption exploiting the so-called birthday paradox.
n
(historical, cryptography, informal) A government or royal court's cryptanalyst department.
n
(cryptography) A governmental facility for intercepting and decrypting communications.
n
(cryptography) A fixed-length group of bits making up part of a message.
n
(cryptography) Any deterministic cipher that operates on fixed-size groups of bits (binary digits), called blocks, with an unvarying transformation specified by a symmetric key.
n
(computing) A symmetric block cipher encryption algorithm used in modern cryptographic software, designed by Bruce Schneier in 1993.
n
(cryptography, physics) The person or system receiving a message or signal from a source conventionally known as Alice.
n
(computing) Standard text or program code used routinely and added with a text editor or word processor; text of a legal or official nature added to documents or labels.
n
Software that allows the user to create a certain kind of automated output.
n
A simple form of encryption in which each letter in the plaintext is shifted through the alphabet a number of positions (for example A→D, B→E, C→F, etc.).
v
(transitive, informal) To convert text to uppercase.
n
Alternative letter-case form of CAPTCHA [A computerized test requiring the human user to perform a task deemed to be difficult to automate, such as entering a displayed series of distorted characters or describing images, to demonstrate that they are a human and not a computer program.]
n
(cryptography) A sheet of card or thin metal, etc., used in composing secret messages. The words of the message are written through a number of holes cut arbitrarily in the sheet, and the remaining paper is then filled with irrelevant words to disguise it.
n
(countable, dated) A secret cipher; a way of writing in code.
n
(cryptography) An attack on a cryptosystem that relies on the attacker's ability to choose any ciphertext of their liking and decrypt it into the corresponding plaintext with that system and key. More powerful than a chosen-plaintext attack.
n
(cryptography) An attack on a cryptosystem that relies on the attacker's ability to choose any plaintext of their liking and encrypt it into the corresponding ciphertext with that system and key. More powerful than a known-plaintext attack but less powerful than a chosen-ciphertext attack.
n
(cryptography, dated) Any predictable facet of the Enigma Machine cipher due to operator error or laziness, whose existence helped the Allies to break the code.
n
A method of transforming a text in order to conceal its meaning.
n
The condition of being a cipher / nonentity
n
One who ciphers.
n
(cryptography) An attack on a cryptosystem that relies only on the attacker's knowledge of some ciphertexts encrypted with that system and key. Less powerful than a known-plaintext attack.
n
The process of encrypting telecommunication signals, as to prevent information from being intercepted by an enemy or competitor.
adj
(cryptography) In contrast to quantum computing; pertaining to cryptographic algorithms that are not designed to resist attack by quantum computers, or cryptanalysis that does not take quantum computer capabilities into account. In some contexts may instead refer to older cryptographic algorithms, e.g. classical ciphers.
n
(cryptography) The unencrypted form of an encrypted text; plain text
v
(cryptography) To encode.
n
(coding theory) A string, usually of a certain specific length, of characters, which have been encoded and transmitted to a receiver.
n
Alternative form of codeword [(cryptography) A string representing an encoded piece of text.]
n
(cryptography) A book, table, database, or other object that stores the mapping between plaintext words or phrases and their equivalents in a code.
n
A cryptanalyst, one who decodes messages without the key.
n
The creator of a code or cipher.
n
The development of codes or ciphers.
n
(computing) A range or region that defines the lower and upper bounds for an encoding.
n
(cryptography) An encoded form of a message, as opposed to plaintext.
n
Alternative form of code vector [Any of a set of vectors produced by encoding a message]
n
(cryptography) A string representing an encoded piece of text.
n
One who computerizes.
n
(mathematics, cryptography) A kind of cryptographic attack on the RSA cryptosystem, based on the Coppersmith method.
n
(cybersecurity) Abbreviation of chosen-plaintext attack. [(cryptography) An attack on a cryptosystem that relies on the attacker's ability to choose any plaintext of their liking and encrypt it into the corresponding ciphertext with that system and key. More powerful than a known-plaintext attack but less powerful than a chosen-ciphertext attack.]
n
(cryptography) A known piece of information corresponding to a section of encrypted text, that is then used to work out the remaining sections.
n
(slang) A cryptographer.
n
The science of analyzing and breaking of codes and ciphers.
n
An expert in analyzing and breaking codes and ciphers.
n
The field of cryptanalysis.
v
To perform cryptanalysis
n
alphametics as a genre of puzzle
adj
Involving use of a code or cipher.
adj
Secret or covert.
n
Alternative form of cryptanalysis [The science of analyzing and breaking of codes and ciphers.]
n
Alternative form of cryptanalyst [An expert in analyzing and breaking codes and ciphers.]
n
Communication that is in code or encrypted, and therefor not comprehensible.
n
(cryptography) A mathematical function used to carry out cryptography.
n
Encrypted text.
adj
Pertaining to cryptograms.
n
A composer or solver of cryptograms.
n
Rare spelling of cryptogram. [Encrypted text.]
n
A person who creates or solves cryptograms.
n
A cipher or cryptogram.
adj
(archaic) cryptographic
n
A person who is an expert on creating codes and cyphers. Someone who studies cryptology.
adv
in a cryptographic manner; using cryptography; for cryptographic purposes
n
Synonym of cryptography
n
(rare) A cryptographer.
n
The discipline concerned with communication security (eg, confidentiality of messages, integrity of messages, sender authentication, non-repudiation of messages, and many other related issues), regardless of the used medium such as pencil and paper or computers.
n
(linguistics) A secret language.
n
One who applies linguistic knowledge to identify cryptographic communications in a given language.
n
The use of linguistic knowledge to identify cryptographic communications in a given language.
n
Secret or enigmatical language.
n
(chiefly military) Any material, such as documents or devices, used in cryptography.
n
The process of reverse-engineering the encryption used by cryptocurrency in order to generate cryptocurrency.
n
A hardware device specifically designed for cryptography.
n
A secret name, a code name.
n
The use of code names or cryptonyms.
n
(computing) Cryptographic operations carried out by a computer or cryptoprocessor.
n
An encryption protocol
n
A cryptogram puzzle that leads to a saying or quotation.
n
A puzzle consisting of a set of thematically related words encrypted with a simple alphabetic cipher.
n
communications security by means of cryptography
n
A system of cryptography.
n
(cryptography) The key used for encryption and decryption.
n
The use of cryptography to design powerful malicious software such as ransomware and asymmetric backdoors.
v
Alternative spelling of cipher [(intransitive, regional, dated) To calculate.]
n
Alternative spelling of ciphertext [Encoded text, text that is unreadable.]
n
A person who deciphers.
n
A person who decodes secret messages
n
A thing, such as an algorithm, a program, or a device, that decrypts.
n
Alternative spelling of decrypter [A thing, such as an algorithm, a program, or a device, that decrypts.]
v
(cryptography) To calculate the differences between the characters in an enciphered text and the characters a fixed number of positions previous.
n
(cryptography) A particular mechanism for key exchange in cryptographic communications.
n
A signature within a mathematical scheme for verifying the authenticity of digital messages or documents.
n
(computing theory) Synonym of string distance.
n
(computing) A different mode or method of operating a computer program.
n
(cryptography) A branch of public-key cryptography in which elliptic curves are used to generate key pairs.
v
To convert plain text into cipher; to encrypt
n
A conversion of plain text into a code or cypher form (for decoding by the recipient).
adj
Being in code; having been encrypted.
n
A thing, such as an algorithm, a program, or a device, that encrypts.
n
(cryptography) A ciphertext, a cryptogram, an encrypted value. Usually used with the preposition "of" followed by the value that is hidden in it.
n
Alternative spelling of encrypter [A thing, such as an algorithm, a program, or a device, that encrypts.]
n
(historical) A German device used during World War II to encode strategic messages.
n
(historical) A small portable electro-mechanical rotor machine used to encrypt and decrypt secret messages, made famous by Germany in WWII.
n
(cryptography) A symmetric structure used in the construction of block ciphers. It is an iterated cipher with an internal function called a round function.
n
Synonym of Feistel cipher
n
(cryptography) A preliminary stage of encryption that divides each plaintext symbol into several ciphertext symbols.
n
(computing, cryptocurrencies) One guess made by a mining computer in the effort of finding the correct answer which releases the next unit of cryptocurrency; see also hashrate.
n
hash function
n
(computing) A block of text included in the source code of a computer program in such a way that it is treated as a single string literal with line breaks etc. as written.
v
Alternative form of hex edit [(computing) To manipulate the fundamental binary data that constitutes a computer file using a hex editor, which displays the data in hexadecimal format.]
n
Alternative form of hex editor [(computing) A text editor that allows for manipulation of the fundamental binary data that constitutes a computer file, displayed in hexadecimal format.]
n
(cryptography) A form of encryption that permits users to perform computations on its encrypted data without first decrypting it.
adj
Connected by hyperlinks.
n
(computing) interconnected data, sometimes with semantics attached to the links between items
v
(of a hypertext document) To point to another document by a hyperlink.
n
(computing) A set of documents interlinked by hyperlinks, along with the links between documents.
adj
converted to hypertext format
n
(computer science) A name that contains useful information about the entity it identifies.
adj
(web design, Cascading Style Sheets) Of a style: inserted in the style attribute of an HTML element instead of in a separate stylesheet.
n
The process of creating information model.
n
(cryptography) With regards to data encryption, ensuring that information is not altered by unauthorized persons in a way that is not detectable by authorized users.
n
(computing, information retrieval, dated) An association link, a device to group multiple words or concepts.
n
(cryptography) The idea that a cryptosystem should be designed to be secure even if everything about the system, except the secret key, is public knowledge.
n
(cryptography) A piece of information (e.g. a passphrase) used to encode or decode a message or messages.
n
(cryptography) An exchange of peers' keys at the initialization phase of connection.
n
(cryptography) Techniques used to make a key more secure against brute force attacks by increasing the resources needed to test each possible key.
n
Alternative form of keyword [(cryptography) Any word used as the key to a code.]
n
(cryptography) A digital repository for the storage of cryptographic keys.
n
(cryptography) The individual or organisation with access to a cryptographic key.
n
(cryptography) A public key and its associated private key (in public-key cryptography).
n
(cryptography) A phrase used in encryption in the style of a keyword.
n
(cryptography) A set of data holding linked encryption keys.
n
(cryptography) In public key cryptography, the server that stores and distributes the public key files.
n
(cryptography) The process of digitally signing someone else's public key using one's own.
n
(cryptography) The notional space that contains all possible cryptographic keys.
n
(computing) A storage area for cryptographic keys.
n
(cryptography) A stream of random or pseudorandom characters that are combined with the plaintext to produce a ciphertext.
n
(cryptography) Any word used as the key to a code.
n
The study of stealing information securely and subliminally.
n
(cryptography) A set of values from which a subset is chosen.
n
(cryptography) An attack on a cryptosystem that relies on the attacker's knowledge of not just some ciphertexts encrypted with that system and key, but also their corresponding plaintexts (cribs). More powerful than a ciphertext-only attack, but less powerful than a chosen-plaintext attack.
n
An Allied cryptanalysis project, during and prior to World War II, that decrypted Japanese messages.
n
(programming) A text input that is never expected to be received in normal conditions and that activates otherwise hidden functionality.
n
(computing) The notation that is used to indicate the meaning of the elements in an electronic document, or to dictate how text should be displayed.
n
A hidden message in a cryptic crossword, revealed when the solution has been filled in.
n
An early form of substitution cipher.
n
(cryptography) A value constructed so as to be unique to a particular message in a stream, in order to prevent replay attacks.
v
Alternative letter-case form of nop [(programming) To replace machine code with nop instructions when modifying software.]
n
(cryptography) A number which, by its construction, is above suspicion of having hidden properties; used in creating cryptographic functions such as hashes and ciphers.
n
(computing) A software program that modifies another program to make it harder to decompile or reverse-engineer.
n
(computing) A type of encryption, or its software, which uses virtual drives to encrypt information that is then decrypted in RAM.
n
(cryptography) A form of encryption where each bit or character from the plaintext is encrypted by a modular addition with a bit or character from a secret random key (or pad) of the same length as the plaintext.
n
(military, cryptography) Extraneous text added to a message for the purpose of concealing its beginning, ending, or length.
adj
(computing) approximately virtual (in terms of paravirtualization)
n
(computing) An approximate virtualization in which the emulated operating system has been modified for convenience or efficiency.
n
(cryptography) Synonym of Alice (“placeholder”)
n
(computing) A password that comprises a whole phrase.
n
(cryptography) Text or any data that is to be encrypted (as opposed to ciphertext).
n
(cryptography, computing) Alternative spelling of plain text [(cryptography) Text or any data that is to be encrypted (as opposed to ciphertext).]
n
(cryptography) the Playfair cipher, or an encryption using it
n
A manual symmetric encryption technique that encrypts pairs of letters (digraphs).
n
(cryptography) An attack on a cryptographic hash function that is able to find a preimage for a hash; that is, it is able to determine (faster than by brute force) some input that results in a known hash when passed through the algorithm.
adj
(cryptography, of a key or secret) Shared between the communicating parties by some secure channel before it needs to be used.
n
(computing) software that encrypts and decrypts messages, for transmission over the Internet, using public-key cryptography
n
The unpublished key in asymmetric cryptography.
n
Alternative spelling of promo code [A term, number, or alphanumeric combination provided electronically to a vendor in order to redeem a marketing promotion.]
n
(cryptography, informal) public key
n
One of the two keys used in asymmetric cryptography, which is published to others, unlike the private key.
n
(computing) A certificate that uses a digital signature to bind together a public key with an identity — used to verify that a public key belongs to an individual.
n
The subfield of cryptography in which all information used to encode a message is assumed to be publicly available.
n
A form of cryptography which allows users to communicate securely without previously agreeing on a shared secret key (abbreviation PKC)
n
(mathematics, cryptography) A table of surjective functions used to decrypt a text that was coded using a hash table.
n
(computing) Text that has been enhanced with formatting, multimedia, etc., such as Microsoft's Rich Text Format or the enriched text format used in electronic mail.
n
(cryptography, euphemistic) The extraction of cryptographic secrets by coercion or torture.
n
(cryptography) A method of rearranging plaintext before encryption by breaking it into two parts and inverting their order, so as to conceal obvious headers, salutations, signatures, etc.
n
(cryptography) A basic component of symmetric-key algorithms, which performs substitution, transforming one set of bits into another.
n
(cryptography) Randomly chosen bytes added to a plaintext message prior to encrypting or hashing it, in order to render brute-force decryption more difficult.
n
A device that makes messages intentionally, but reversibly, unintelligible for reasons of privacy or security.
n
(cryptography) An attack on a cryptographic hash function that is able to find a second preimage for a hash and its preimage; that is, given a hash and an input that has that specific hash, it is able to find (faster than by brute force) another input with the same hash.
n
(cryptography) Any method for distributing a secret amongst a group of participants, each of whom is allocated a share; the secret can be reconstructed only when a sufficient number of shares (possibly of different types) are combined.
adj
(cryptography, Data Encryption Standard) Producing only two different subkeys.
n
(computer science) A unique string of characters recognised by a computer program for processing in a special way; a keyword.
n
(cryptography) "The enemy knows the system" - a restatement of Kerckhoffs's principle
v
To employ signcryption
n
A system of encryption that includes a digital signature
n
(cryptography) A cryptographic key that is divided into two or more values that individually cannot be used to deduce the entire key.
n
(computing) a word, usually one of a series in a stop list, that is ignored when searches are conducted on a database, search engine, or the like.
n
(programming) Abbreviation of string. (sequence of text characters) [(countable) A long, thin and flexible structure made from threads twisted together.]
n
(cryptography) a symmetric-key cipher in which plaintext digits are combined with a pseudorandom cipher digit stream
n
Alternative form of stream cipher [(cryptography) a symmetric-key cipher in which plaintext digits are combined with a pseudorandom cipher digit stream]
n
A secondary cipher
n
(cryptography) A partial key.
n
(cryptography) A subsidiary stage of encryption, part of a round.
n
(cryptography) A method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing an inverse substitution.
n
A substitution cipher
v
To superencrypt.
v
To superencipher.
n
The application of a series of multiple encryption processes to a text.
adj
(cryptography) Using the same key (or keys that are trivially related) for both encryption and decryption.
n
(computing) A keyword, term, or phrase associated with or assigned to data, media, and/or information enabling keyword-based classification; often used to categorize content.
n
(computing, Internet, informal) Poorly structured code in a markup language that uses tags (such as HTML), especially when it violates specifications.
n
(computing theory) A program or algorithm that adds tags for purposes of categorization, e.g. grammatical information to words in a document, or genres to songs in a music collection.
n
(translation studies, software) A database of terminology, usually in a multilingual format.
n
(computing) Data which can be interpreted as human-readable text.
n
An operation used in natural language processing to modify, enhance, classify or otherwise process an existing corpus of human-readable text.
n
The analysis of textual data (often automated)
n
(cryptography) A symmetric-key tweakable block cipher involving the Skein hash function.
n
(computing) The inclusion of part of one hypertext document in another one by means of reference rather than copying.
n
(cryptography) A manual cryptanalysis technique used in breaking the Lorenz cipher during World War II, based on deducing the wheel settings of the machine that did the encryption.
n
(cryptography) An additional input to a block cipher, used in conjunction with the key to select the permutation computed by the cipher.
adj
(cryptography, not comparable) Of a block cipher: accepting a second input (the "tweak"), used in conjunction with the key to select the permutation computed by the cipher.
n
An encryption algorithm, related to the earlier Blowfish, used in modern cryptographic software.
n
(usually capitalised) Code name used by British codebreakers during World War 2 for decrypted information gained from the enemy.
v
To encode a secret message that is masked by a surface message or stream of data.
n
(computing, informal) Conversion to a format, platform, etc. compatible with Unicode.
n
Alternative spelling of use case [(software engineering) A potential scenario in which a system receives an external request (such as user input) and responds to it.]
n
A computer program that performs vectorization.
n
A text encryption technique that uses a series of different Caesar ciphers based on the letters of a keyword.
n
(cryptography) A decentralized cryptographic mechanism for establishing the authenticity of the binding between a public key and its owner.
n
Meaningless text generated by a computer.
n
(computing, historical) A hash code technique used in some punch card systems.
n
(cryptography) The erasure of sensitive parameters from a cryptographic module to prevent their disclosure if the equipment is captured.

Note: Concept clusters like the one above are an experimental OneLook feature. We've grouped words and phrases into thousands of clusters based on a statistical analysis of how they are used in writing. Some of the words and concepts may be vulgar or offensive. The names of the clusters were written automatically and may not precisely describe every word within the cluster; furthermore, the clusters may be missing some entries that you'd normally associate with their names. Click on a word to look it up on OneLook.
  Reverse Dictionary / Thesaurus   Datamuse   Compound Your Joy   Threepeat   Spruce   Feedback   Dark mode   Help


Our daily word games Threepeat and Compound Your Joy are going strong. Bookmark and enjoy!

Today's secret word is 6 letters and means "Not working as originally intended." Can you find it?