Cybersecurity Fundamentals Chapter 4
Across
- 1. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
- 4. use one key to encrypt data and a different key to decrypt data.
- 8. to encrypt and decrypt messages.
- 10. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
- 11. science of making and breaking secret codes.
- 12. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
Down
- 2. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
- 3. has a fixed block size of 128, 192 or 256 bits.
- 5. implementing cryptography into a web browser.
- 6. a protocol that provides a secure remote access connection to network devices.
- 7. way to store and transmit data so only the intended recipient can read or process it.
- 9. fundamental component of ipsec virtual private networks (vpn).