Security Plus Chapter 3
Across
- 5. The process of changing encrypted text into the original text
- 7. uses two mathematically related keys
- 8. two or more different messages that produce the same hash value
- 9. evidence or proof of something
- 12. A removable external cryptographic device
- 14. digital fingerprints
- 16. A downgrade attack
- 18. to implementing an older and less secure mode “fall back”
- 19. An electronic verification of the sender
Down
- 1. bruteforce collision attack that exploits the probability theory
- 2. denial of the truth or validity of something
- 3. The process of changing plaintext into ciphertext
- 4. hiding data within an ordinary, nonsecret file
- 6. cryptoprocessor
- 10. object whose state cannot be modified after it is created
- 11. decentralized, distributed and public digital ledger
- 13. is a finite sequence of rigorous instructions
- 15. The process of sending and receiving secure cryptographic keys
- 17. protect the entire hard drive using cryptography