CNS

1234567891011121314151617181920
Across
  1. 2. Software designed to damage or disrupt systems
  2. 4. Public key cryptographic algorithm by Rivest Shamir Adleman
  3. 7. Fraudulent attempt to steal sensitive information
  4. 8. Impersonating a trusted source in communication
  5. 14. Used to verify authenticity of a message
  6. 15. Unauthorized attempt to exploit a system
  7. 16. Block cipher mode using counters for encryption
  8. 17. Random value used once in cryptographic communication
  9. 19. Block cipher mode that encrypts blocks independently
Down
  1. 1. One-way process to generate fixed length output
  2. 3. Attack that overwhelms a service with requests
  3. 5. Capturing network traffic secretly
  4. 6. Large number used in RSA calculations
  5. 7. Encryption system for secure email communication
  6. 9. Key used for encryption and signature verification
  7. 10. Intercepts communication between two parties
  8. 11. MAC technique using a hash function and secret key
  9. 12. Message authentication code for integrity verification
  10. 13. Secret key used for decryption and signing
  11. 18. Stream-like block cipher mode using feedback
  12. 20. Common block cipher mode using chaining