Across
- 2. Software designed to damage or disrupt systems
- 4. Public key cryptographic algorithm by Rivest Shamir Adleman
- 7. Fraudulent attempt to steal sensitive information
- 8. Impersonating a trusted source in communication
- 14. Used to verify authenticity of a message
- 15. Unauthorized attempt to exploit a system
- 16. Block cipher mode using counters for encryption
- 17. Random value used once in cryptographic communication
- 19. Block cipher mode that encrypts blocks independently
Down
- 1. One-way process to generate fixed length output
- 3. Attack that overwhelms a service with requests
- 5. Capturing network traffic secretly
- 6. Large number used in RSA calculations
- 7. Encryption system for secure email communication
- 9. Key used for encryption and signature verification
- 10. Intercepts communication between two parties
- 11. MAC technique using a hash function and secret key
- 12. Message authentication code for integrity verification
- 13. Secret key used for decryption and signing
- 18. Stream-like block cipher mode using feedback
- 20. Common block cipher mode using chaining
