Encryption

1234567
Across
  1. 4. ___ your sensitive files
  2. 5. Result of hashing is a ___
  3. 6. Digital signature can identify the ___
  4. 7. Scramble a message
Down
  1. 1. A ___ crypto system can achieve digital signature
  2. 2. A ___ crypto system uses a secret key
  3. 3. The encode/decode methods
  4. 5. Digital signature can be used to safely ___ software