CRYPTOGRAPHY

1234567891011121314151617181920212223242526272829
Across
  1. 6. Process of securely sharing cryptographic keys
  2. 8. Pretending to be a trusted person or authority
  3. 9. Binary finite field used in AES encryption
  4. 12. Protocol suite securing network layer communication
  5. 14. Finite field built using prime numbers
  6. 15. Mathematical foundation for cryptography
  7. 16. Initial secure communication establishment process
  8. 17. Short form representing a Galois field
  9. 19. Secret value known only to the owner
  10. 22. Using attractive offers or infected USB drives to attack users
  11. 23. Hard mathematical problem behind Diffie Hellman
  12. 24. Branch of mathematics used in cryptography
  13. 25. Key shared openly for encryption or authentication
  14. 26. Secretly listening to private communication
  15. 29. Manipulating people to reveal confidential data
Down
  1. 1. Operation that finds the remainder after division
  2. 2. Arithmetic performed with remainders
  3. 3. Another name for a finite field
  4. 4. Creating a fake story to obtain sensitive information
  5. 5. Converting data into unreadable form for security
  6. 7. Member or value inside a finite field
  7. 10. Targeted phishing attack on specific individuals
  8. 11. Mathematical field with a limited number of elements
  9. 13. Temporary key used during a communication session
  10. 18. Public base value used in Diffie Hellman
  11. 19. Unauthorized access by following an authorized person
  12. 20. Fraudulent call pretending to offer support or services
  13. 21. Redirecting users to fake websites secretly
  14. 27. Public key algorithm for secure key exchange
  15. 28. Fake email scam used to steal information