SN33003FP Chapter 5

12345678910111213
Across
  1. 1. Changes every time the data is altered
  2. 3. One way and is not reversible
  3. 6. Has a fixed length
  4. 7. A random string of characters added to the password before hashing
  5. 10. Can be any length
  6. 12. A mathematical method to establish authenticity, integrity and non-repudiation of a message, digital document, or software
  7. 13. Strengthens hashing algorithms by using an additional secret key as input to the hash function
Down
  1. 2. Can be 224, 256, 384 or 512 bits
  2. 4. Equivalent to an electronic passport
  3. 5. Ensures that neither the sender nor the recipient can deny sending or receiving a message or document
  4. 8. Attempts every possible combination of characters up to a given length to crack a hash
  5. 9. Uses a file containing common words, phrases and passwords to crack a hash
  6. 11. Produces a 128-bit hash value