CNS

123456789101112131415161718192021222324
Across
  1. 2. Block cipher mode that encrypts blocks independently
  2. 3. Block cipher mode where each block depends on previous ciphertext
  3. 4. Message authentication code for integrity verification
  4. 5. Public key cryptographic algorithm by Rivest Shamir Adleman
  5. 8. Large number used in RSA calculations
  6. 11. Intercepts communication between two parties
  7. 13. Impersonating a trusted source in communication
  8. 15. Unauthorized attempt to exploit a system
  9. 17. Random value used once in cryptographic communication
  10. 18. One-way process to generate fixed length output
  11. 20. Process of converting ciphertext back into plaintext
  12. 23. Malware that locks files for payment
Down
  1. 1. Common block cipher mode using chaining
  2. 2. Process of converting plaintext into ciphertext
  3. 6. Capturing network traffic secretly
  4. 7. Secret key used for decryption and signing
  5. 9. Attack that overwhelms a service with requests
  6. 10. Used to verify authenticity of a message
  7. 12. Software designed to damage or disrupt systems
  8. 14. Fraudulent attempt to steal sensitive information
  9. 16. Key used for encryption and signature verification
  10. 19. MAC technique using a hash function and secret key
  11. 21. Block cipher mode using counters for encryption
  12. 22. Encryption system for secure email communication
  13. 24. Stream-like block cipher mode using feedback