CRYPTOGRAPHY
Across
- 6. Process of securely sharing cryptographic keys
- 8. Pretending to be a trusted person or authority
- 9. Binary finite field used in AES encryption
- 12. Protocol suite securing network layer communication
- 14. Finite field built using prime numbers
- 15. Mathematical foundation for cryptography
- 16. Initial secure communication establishment process
- 17. Short form representing a Galois field
- 19. Secret value known only to the owner
- 22. Using attractive offers or infected USB drives to attack users
- 23. Hard mathematical problem behind Diffie Hellman
- 24. Branch of mathematics used in cryptography
- 25. Key shared openly for encryption or authentication
- 26. Secretly listening to private communication
- 29. Manipulating people to reveal confidential data
Down
- 1. Operation that finds the remainder after division
- 2. Arithmetic performed with remainders
- 3. Another name for a finite field
- 4. Creating a fake story to obtain sensitive information
- 5. Converting data into unreadable form for security
- 7. Member or value inside a finite field
- 10. Targeted phishing attack on specific individuals
- 11. Mathematical field with a limited number of elements
- 13. Temporary key used during a communication session
- 18. Public base value used in Diffie Hellman
- 19. Unauthorized access by following an authorized person
- 20. Fraudulent call pretending to offer support or services
- 21. Redirecting users to fake websites secretly
- 27. Public key algorithm for secure key exchange
- 28. Fake email scam used to steal information