Encryption
Across
- 4. ___ your sensitive files
- 5. Result of hashing is a ___
- 6. Digital signature can identify the ___
- 7. Scramble a message
Down
- 1. A ___ crypto system can achieve digital signature
- 2. A ___ crypto system uses a secret key
- 3. The encode/decode methods
- 5. Digital signature can be used to safely ___ software