Cryptography

123456789
Across
  1. 3. The science of using mathematics to encrypt and decrypt data.
  2. 5. Pretty Good Privacy.
  3. 6. Type of cryptography, also called secret-key or symmetric-key encryption, in which one key is used both for encrypting and decrypting.
  4. 8. Encrypting plaintext results in unreliable gibberish is called …
  5. 9. Public-key cryptosystem, named for its inventors: Ron Rivest, Adi Shamir and Leonard Adleman.
Down
  1. 1. Ciphertext for the word “secret” using Ceasar’s cipher, where key is 3.
  2. 2. Data, that can be read and understood without any special measures.
  3. 3. The science of analyzing and breaking secure communication.
  4. 4. Ciphertext for the word “example” using Ceasar’s cipher, where key is 2.
  5. 6. The science, that embraces both cryptography and cryptanalysis.
  6. 7. PGP creates “… key” which is a one-time-only secret key.