CNS
Across
- 2. Block cipher mode that encrypts blocks independently
- 3. Block cipher mode where each block depends on previous ciphertext
- 4. Message authentication code for integrity verification
- 5. Public key cryptographic algorithm by Rivest Shamir Adleman
- 8. Large number used in RSA calculations
- 11. Intercepts communication between two parties
- 13. Impersonating a trusted source in communication
- 15. Unauthorized attempt to exploit a system
- 17. Random value used once in cryptographic communication
- 18. One-way process to generate fixed length output
- 20. Process of converting ciphertext back into plaintext
- 23. Malware that locks files for payment
Down
- 1. Common block cipher mode using chaining
- 2. Process of converting plaintext into ciphertext
- 6. Capturing network traffic secretly
- 7. Secret key used for decryption and signing
- 9. Attack that overwhelms a service with requests
- 10. Used to verify authenticity of a message
- 12. Software designed to damage or disrupt systems
- 14. Fraudulent attempt to steal sensitive information
- 16. Key used for encryption and signature verification
- 19. MAC technique using a hash function and secret key
- 21. Block cipher mode using counters for encryption
- 22. Encryption system for secure email communication
- 24. Stream-like block cipher mode using feedback