Cryptography

1234567891011121314151617181920212223242526272829
Across
  1. 2. - Encryption that uses two different keys, one for encryption and one for decryption.
  2. 3. - A method where one party proves they know something without revealing it.
  3. 5. - A method used to encrypt and decrypt information.
  4. 6. - Adding random data to passwords before hashing to increase security.
  5. 7. - A digital ledger of transactions that is secure and decentralized.
  6. 9. - The practice of hiding data within other non-secret data.
  7. 12. - The process of converting encrypted data back into its original form.
  8. 13. - Advanced Encryption Standard, a secure symmetric encryption technique.
  9. 15. - A widely used asymmetric cryptographic algorithm.
  10. 16. - Secure Sockets Layer, a protocol for encrypting data transferred over the internet.
  11. 19. - A cipher that uses multiple alphabets to encrypt data.
  12. 22. Force - A method of attempting to crack a code by trying all possible combinations.
  13. 24. - A simple cipher where each letter is shifted by a fixed number of positions.
  14. 27. - An attack where a third party secretly intercepts communication.
  15. 28. Signature - A way to verify the authenticity of digital messages or documents.
  16. 29. Key - A key that is kept secret in asymmetric encryption to decrypt data.
Down
  1. 1. - A piece of information used in cryptography to lock or unlock data.
  2. 2. - A set of rules used for solving problems, especially in encryption.
  3. 4. - A random number used only once in cryptographic communication.
  4. 8. - The study of breaking codes and decrypting information without a key.
  5. 10. - Transport Layer Security, a protocol for secure internet communications.
  6. 11. - The process of converting data into a coded form to prevent unauthorized access.
  7. 14. Curve - A type of cryptography based on the mathematics of elliptic curves.
  8. 17. - A future form of cryptography based on quantum computing principles.
  9. 18. Exchange - The process of sharing cryptographic keys securely between parties.
  10. 20. Pad - An encryption method that uses a single-use pre-shared key.
  11. 21. Key - A key that can be shared openly in asymmetric encryption.
  12. 23. - Virtual Private Network, used to create a secure connection over the internet.
  13. 25. - Encryption where the same key is used for both encryption and decryption.
  14. 26. - A function that converts data into a fixed-size string of characters.