Advance Cyber Chapter 4(2)

12345678910111213141516171819202122232425
Across
  1. 1. A property of hashing algorithms meaning a small change in the input creates a significant change in the output. (2 Words)
  2. 3. The length of a key, measured in bits. (2 Words)
  3. 4. A digital document that binds a public key to an identity. (2 Words)
  4. 5. An older symmetric block cipher with a 64-bit block size that is now considered insecure. (abbreviation)
  5. 11. An asymmetric algorithm commonly used for generating and sharing keys. (2 Words)
  6. 12. The unreadable, encrypted data.
  7. 13. A type of encryption that uses the same key for both encryption and decryption.
  8. 15. The framework of policies, standards, and software that manages digital certificates and public-key encryption. (abbreviation)
  9. 18. A one-way function that converts an input of any size into a fixed-size string of text.
  10. 20. The concept that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. (2 Words)
  11. 22. A block cipher standard used by the U.S. government. (abbreviation)
  12. 23. An outdated hashing algorithm that produces a 128-bit hash value. (abbreviation)
  13. 24. The strength of this depends on the secrecy of the key, not the algorithm.
  14. 25. The practice and study of techniques for secure communication in the presence of adversaries.
Down
  1. 2. An entity that issues digital certificates. (2 Words)
  2. 6. A symmetric algorithm that encrypts data one bit or byte at a time. (2 Words)
  3. 7. A mathematical formula or process used for encryption and decryption.
  4. 8. list of digital certificates that have been revoked and are no longer valid. (abbreviation)
  5. 9. A cryptographic key that is known by all parties involved in the secured communication. (2 Words)
  6. 10. The process of converting ciphertext back into plaintext.
  7. 14. A symmetric key algorithm that encrypts data in fixed-size chunks. (2 Words)
  8. 16. A property of hashing algorithms ensures that two different inputs will not produce the same output. (2 Words)
  9. 17. A cryptographic method that uses two separate but related keys: one public and one private.
  10. 19. A secure hashing algorithm that produces a 256-bit hash value. (abbreviation)
  11. 21. The original, readable data before it is encrypted.