Cryptography and Hash Function

123456789101112131415
Across
  1. 3. The name of the message returned by hash function
  2. 5. Unencrypted information
  3. 6. To refuse to accept something or someone as true, good, or reasonable
  4. 10. Someone listening to a private conversation without them knowing
  5. 11. A way to guarantee that the sender of a message cannot later deny having sent the message
  6. 13. Protecting the information from disclosure to unauthorized parties
  7. 15. Not able to be understood
Down
  1. 1. Improbable to happen
  2. 2. An event that happens when different data inputs generate the same hash value
  3. 3. A procedure that for a given input value it must always generate the same output
  4. 4. The process of determining whether someone who it declares itself to be
  5. 7. An effect/property where if an input is changed slightly (for example, flipping a single bit), the output changes significantly
  6. 8. It is not realistic to reconstruct the input given the output without spending great amounts of computing time (property).
  7. 9. The version of hash function that ensures the integrity, authentication and autenticity.
  8. 12. The name of the function that can be used to map data of arbitrary size to data of fixed size.
  9. 14. Protecting information from being modified by unauthorized parties