Across
- 2. The process of changing plaintext into ciphertext
- 4. The process of changing encrypted text into the original text
- 7. hiding data within an ordinary, non-secret file
- 9. Uptime for computers
- 10. uses two mathematically related keys
- 11. cryptoprocessor
- 13. brute force collision attack that exploits the probability theory
- 16. Three basic security protections
- 19. to implementing an older and less secure mode “fall back”
- 22. multiplies two large prime numbers
- 23. also called a cipher
- 24. two or more different messages that produce the same hash value
- 27. The art of writing in cipher
- 29. digital fingerprints
- 30. protect the entire hard drive using cryptography
Down
- 1. An electronic verification of the sender
- 3. long-term secret key does not compromise the confidentiality of past communications
- 5. denial of the truth or validity of something
- 6. a strong symmetric cryptographic algorithm
- 8. decentralized, distributed and public digital ledger
- 9. evidence or proof of something
- 12. The process of sending and receiving secure cryptographic keys
- 14. A removable external cryptographic device
- 15. data used to describe the content or structure of the actual data
- 17. is a finite sequence of rigorous instructions
- 18. countermeasure
- 20. immutable ledger that facilitates the process of recording transactions
- 21. object whose state cannot be modified after it is created
- 25. ensure data has not been altered
- 26. mathematical value entered into the algorithm to produce ciphertext
- 28. A downgrade attack
