Computer Network security

12345678910
Across
  1. 1. Heart of Data Encryption Standard (DES), is the
  2. 4. keys An asymmetric-key (or public-key) cipher uses
  3. 5. A device allowing some packets to pass and blocking others.
  4. 6. a device or software application that monitors internal network
  5. 7. trusted third party that assigns a symmetric key to two parties
  6. 9. a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information
Down
  1. 2. Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
  2. 3. Electronic Code Book is
  3. 8. A hash function guarantees integrity of a message. It guarantees that message has not be
  4. 10. A digital signature needs a