| 1. | In the seditious articles and documents, and also possession of a cipher key.
|
| 2. | In contrast, the security of ciphers is generally dependent on protecting the cipher keys.
|
| 3. | The keyword together with the conventions for filling in the 5 by 5 table constitute the cipher key.
|
| 4. | Cipher keys can be stolen and people can betray them, but they are much easier to change and distribute.
|
| 5. | The cipher key length can vary between 128 and 256 bits, but the guaranteed security is only 128 bits.
|
| 6. | The general setup of each round is the same, except for some hard-coded parameters and a part of the cipher key, called a subkey.
|
| 7. | In " Orphaned ", Lydia and Stiles pay Meredith a visit at Eichen House where they implore her to reveal the final cipher key.
|
| 8. | Bastian's involvement in Mary's secret correspondence was noted again in 1575, and in 1580 he sent a cipher key to one of his relations.
|
| 9. | The first capture of a naval Enigma machine and associated cipher keys from a U-boat were made on 9 May 1941 by of Captain Joe Baker-Cresswell.
|
| 10. | LEXICON allowed a user to input any type of cipher key, and it was here that ALW began to be colloquially referred to by LEXICON users as'Cipher 6 '.
|