Cybersecurity
Across
- 3. Outdated symmetric key method of data encryption
- 6. Plastic card that contains a memory chip and microprocessor or just a memory chip
- 8. Symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream
- 14. Traditionally need large integers composed of two or more large prime factors
- 18. A process used to encrypt and decrypt large plaintext inputs by creating a cryptographic chain wherein each ciphertext block is dependent on the last.
- 19. Set of communication rules or protocols for setting up secure connections over a network
- 20. Variable length, symmetric, 64-bit block cipher
- 21. Virtual Private Network; Protects users when browsing the web
- 22. Encryption with authentication
- 24. constructing and analyzing protocols that prevent third parties or the public from reading private messages.
Down
- 1. Prevents modification of data
- 2. Block cipher mode/acts like a stream cipher
- 4. An encryption-based Internet security protocol. It was first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data integrity in Internet communications
- 5. Extends use of DES cipher
- 7. US Federal Government Standard
- 9. The process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel
- 10. A cryptographic network protocol for operating network services securely over an unsecured network
- 11. Hash Based Message Authentication Code; A cryptographic network protocol for operating network services securely over an unsecured network
- 12. Used for encryption, digital signatures, pseudo-random generators, and more
- 13. The practice of concealing information within another message or physical object to avoid detection.
- 15. Simplest encryption mode/Too simple for most cases
- 16. Family of message digest algorithms
- 17. Encryption program that provides cryptographic privacy and authentication for data communication
- 23. Public key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem.