Security Plus Chapter 3

12345678910111213141516171819
Across
  1. 5. The process of changing encrypted text into the original text
  2. 7. uses two mathematically related keys
  3. 8. two or more different messages that produce the same hash value
  4. 9. evidence or proof of something
  5. 12. A removable external cryptographic device
  6. 14. digital fingerprints
  7. 16. A downgrade attack
  8. 18. to implementing an older and less secure mode “fall back”
  9. 19. An electronic verification of the sender
Down
  1. 1. bruteforce collision attack that exploits the probability theory
  2. 2. denial of the truth or validity of something
  3. 3. The process of changing plaintext into ciphertext
  4. 4. hiding data within an ordinary, nonsecret file
  5. 6. cryptoprocessor
  6. 10. object whose state cannot be modified after it is created
  7. 11. decentralized, distributed and public digital ledger
  8. 13. is a finite sequence of rigorous instructions
  9. 15. The process of sending and receiving secure cryptographic keys
  10. 17. protect the entire hard drive using cryptography