Modern Cryptography,AES,RSA, X.509, Intruders

123456789101112131415161718192021222324252627282930
Across
  1. 3. Process of converting ciphertext back to plaintext
  2. 6. Prevents denial of having performed an action
  3. 8. Encrypts data one bit or byte at a time
  4. 9. Process of handling cryptographic keys securely
  5. 11. Symmetric encryption standard adopted by NIST
  6. 13. Security system that monitors and controls network traff
  7. 15. One-way function producing fixed-length output
  8. 17. Cryptography based on elliptic curve mathematics
  9. 19. Digital document binding identity to a public key
  10. 22. Key used to encrypt data in asymmetric cryptography
  11. 23. Science of securing communication and data
  12. 24. Standard for public key certificates
  13. 26. Secure protocol using certificates for communication
  14. 27. Attack intercepting communication between two parties
  15. 28. General process of converting plaintext into ciphertext
  16. 30. Verifying identity of a user or system
Down
  1. 1. Original readable message before encryption
  2. 2. Encrypts data in fixed-size blocks
  3. 4. Ensures authenticity and integrity of data
  4. 5. Unauthorized entity attempting system access
  5. 7. Key exchange protocol using discrete logarithms
  6. 10. Exhaustive search attack on cryptographic keys
  7. 12. Secret key used for decryption in asymmetric cryptography
  8. 14. Security principle ensuring data is not altered
  9. 16. Output of encryption process
  10. 18. Method to prove knowledge without revealing information
  11. 20. Process of securely sharing cryptographic keys
  12. 21. Malicious software designed to disrupt or gain access
  13. 25. Predecessor of TLS for secure communication
  14. 29. Public-key cryptosystem based on prime factorization