Across
- 1. Heart of Data Encryption Standard (DES), is the
- 4. a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information
- 6. trusted third party that assigns a symmetric key to two parties
- 7. A device allowing some packets to pass and blocking others.
- 9. An asymmetric-key (or public-key) cipher uses
- 10. A hash function guarantees integrity of a message. It guarantees that message has not be
Down
- 2. Man-in-the-middle attack can endanger security of Diffie-Hellman method if two parties are not
- 3. Electronic Code Book is
- 5. A digital signature needs a
- 8. a device or software application that monitors internal network
