Across
- 2. - Encryption that uses two different keys, one for encryption and one for decryption.
- 3. - A method where one party proves they know something without revealing it.
- 5. - A method used to encrypt and decrypt information.
- 6. - Adding random data to passwords before hashing to increase security.
- 7. - A digital ledger of transactions that is secure and decentralized.
- 9. - The practice of hiding data within other non-secret data.
- 12. - The process of converting encrypted data back into its original form.
- 13. - Advanced Encryption Standard, a secure symmetric encryption technique.
- 15. - A widely used asymmetric cryptographic algorithm.
- 16. - Secure Sockets Layer, a protocol for encrypting data transferred over the internet.
- 19. - A cipher that uses multiple alphabets to encrypt data.
- 22. Force - A method of attempting to crack a code by trying all possible combinations.
- 24. - A simple cipher where each letter is shifted by a fixed number of positions.
- 27. - An attack where a third party secretly intercepts communication.
- 28. Signature - A way to verify the authenticity of digital messages or documents.
- 29. Key - A key that is kept secret in asymmetric encryption to decrypt data.
Down
- 1. - A piece of information used in cryptography to lock or unlock data.
- 2. - A set of rules used for solving problems, especially in encryption.
- 4. - A random number used only once in cryptographic communication.
- 8. - The study of breaking codes and decrypting information without a key.
- 10. - Transport Layer Security, a protocol for secure internet communications.
- 11. - The process of converting data into a coded form to prevent unauthorized access.
- 14. Curve - A type of cryptography based on the mathematics of elliptic curves.
- 17. - A future form of cryptography based on quantum computing principles.
- 18. Exchange - The process of sharing cryptographic keys securely between parties.
- 20. Pad - An encryption method that uses a single-use pre-shared key.
- 21. Key - A key that can be shared openly in asymmetric encryption.
- 23. - Virtual Private Network, used to create a secure connection over the internet.
- 25. - Encryption where the same key is used for both encryption and decryption.
- 26. - A function that converts data into a fixed-size string of characters.
