Chapter 3 Security Plus

123456789101112131415161718192021222324252627282930
Across
  1. 2. The process of changing plaintext into ciphertext
  2. 4. The process of changing encrypted text into the original text
  3. 7. hiding data within an ordinary, non-secret file
  4. 9. Uptime for computers
  5. 10. uses two mathematically related keys
  6. 11. cryptoprocessor
  7. 13. brute force collision attack that exploits the probability theory
  8. 16. Three basic security protections
  9. 19. to implementing an older and less secure mode “fall back”
  10. 22. multiplies two large prime numbers
  11. 23. also called a cipher
  12. 24. two or more different messages that produce the same hash value
  13. 27. The art of writing in cipher
  14. 29. digital fingerprints
  15. 30. protect the entire hard drive using cryptography
Down
  1. 1. An electronic verification of the sender
  2. 3. long-term secret key does not compromise the confidentiality of past communications
  3. 5. denial of the truth or validity of something
  4. 6. a strong symmetric cryptographic algorithm
  5. 8. decentralized, distributed and public digital ledger
  6. 9. evidence or proof of something
  7. 12. The process of sending and receiving secure cryptographic keys
  8. 14. A removable external cryptographic device
  9. 15. data used to describe the content or structure of the actual data
  10. 17. is a finite sequence of rigorous instructions
  11. 18. countermeasure
  12. 20. immutable ledger that facilitates the process of recording transactions
  13. 21. object whose state cannot be modified after it is created
  14. 25. ensure data has not been altered
  15. 26. mathematical value entered into the algorithm to produce ciphertext
  16. 28. A downgrade attack