Across
- 4. set of steps to follow to modify the message according to the rules defined
- 5. When the DoS attack is not coming from a single host
- 6. on purpose
- 8. Who applies digital signature
- 10. Kind of attacks performed to discover and map system vulnerabilities
- 11. Traditional signature
Down
- 1. The key used by the sender in order to ensure authentication
- 2. Who is responsible for certification, validation and revocation of certificates
- 3. it is not realistic to reconstruct the input given the output without spending great amounts of computing time.
- 7. Property ensured by the digital signature
- 9. Something that has no sense
