Advance Cyber Chapter 4(2)
Across
- 1. A property of hashing algorithms meaning a small change in the input creates a significant change in the output. (2 Words)
- 3. The length of a key, measured in bits. (2 Words)
- 4. A digital document that binds a public key to an identity. (2 Words)
- 5. An older symmetric block cipher with a 64-bit block size that is now considered insecure. (abbreviation)
- 11. An asymmetric algorithm commonly used for generating and sharing keys. (2 Words)
- 12. The unreadable, encrypted data.
- 13. A type of encryption that uses the same key for both encryption and decryption.
- 15. The framework of policies, standards, and software that manages digital certificates and public-key encryption. (abbreviation)
- 18. A one-way function that converts an input of any size into a fixed-size string of text.
- 20. The concept that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. (2 Words)
- 22. A block cipher standard used by the U.S. government. (abbreviation)
- 23. An outdated hashing algorithm that produces a 128-bit hash value. (abbreviation)
- 24. The strength of this depends on the secrecy of the key, not the algorithm.
- 25. The practice and study of techniques for secure communication in the presence of adversaries.
Down
- 2. An entity that issues digital certificates. (2 Words)
- 6. A symmetric algorithm that encrypts data one bit or byte at a time. (2 Words)
- 7. A mathematical formula or process used for encryption and decryption.
- 8. list of digital certificates that have been revoked and are no longer valid. (abbreviation)
- 9. A cryptographic key that is known by all parties involved in the secured communication. (2 Words)
- 10. The process of converting ciphertext back into plaintext.
- 14. A symmetric key algorithm that encrypts data in fixed-size chunks. (2 Words)
- 16. A property of hashing algorithms ensures that two different inputs will not produce the same output. (2 Words)
- 17. A cryptographic method that uses two separate but related keys: one public and one private.
- 19. A secure hashing algorithm that produces a 256-bit hash value. (abbreviation)
- 21. The original, readable data before it is encrypted.