Unit 1 - INS
Across
- 2. The repetition of encrypting the IV
- 4. ATTACK ON AUTHENTICITY
- 6. Monitoring of datastream of attacks
- 7. Simplest mode of encryption.
Down
- 1. ATTACK ON INTEGRITY
- 3. Monitoring of transmissions of attacks
- 5. Rivest Shamir Adleman