Cryptography
Across
- 1. Ciphertext for the word “example” using Ceasar’s cipher, where key is 2.
- 5. The science of using mathematics to encrypt and decrypt data.
- 6. Pretty Good Privacy.
- 7. Data, that can be read and understood without any special measures.
- 8. Type of cryptography, also called secret-key or symmetric-key encryption, in which one key is used both for encrypting and decrypting.
- 9. The science, that embraces both cryptography and cryptanalysis.
- 11. PGP creates “… key” which is a one-time-only secret key.
Down
- 2. Encrypting plaintext results in unreliable gibberish is called …
- 3. Ciphertext for the word “secret” using Ceasar’s cipher, where key is 3.
- 4. The science of analyzing and breaking secure communication.
- 10. Public-key cryptosystem, named for its inventors: Ron Rivest, Adi Shamir and Leonard Adleman.