Crossword 6

12345678910111213141516171819
Across
  1. 7. decodes information encoded with its associated public key, encrypting information that can be decrypted only by its associated key
  2. 8. ensures that the sender cannot deny sending a message
  3. 10. the range of valid keys used by an algorithm
  4. 12. process of converting ciphertext back into plain text
  5. 14. the ability of a product or services to provide adequate performance across changes in size, load, scope, or volume
  6. 16. a set of rules and procedures usually mathematical in nature
  7. 18. a communication pathway, circuit, or frequency dedicated or reserved for a specific transmission
  8. 19. the standards body for Internet-related engineering specifications
Down
  1. 1. any product that appears in a vendor’s PowerPoint slide deck, but is not yet available in its products
  2. 2. triggering the generation of a new symmetric encryption key and secure exchange of that key
  3. 3. seemingly random and unusable output from a cryptographic function applied to original data
  4. 4. this occurs when a dataset is too large for maximum supported size of a communication container, such as a segment, packet, or frame
  5. 5. removal of redundant or superfluous data or space to reduce the size of the data
  6. 6. art and science of hiding information from unauthorized third parties
  7. 9. a common protocol used in establishing direct connection between two networking nodes
  8. 11. the ability for a network or system to remain unknown
  9. 13. process where malicious code can enter from a non-secure network and make a sharp turn into a secure network
  10. 14. (SSH) network protocol that allows data exchange using a secure channel between two networking devices.
  11. 15. usually a dedicated line between network locations or to the Internet
  12. 17. the process of verifying data integrity