Cryptography And Network Security

1234567891011121314151617181920
Across
  1. 4. In base 26, multiplication of YES by NO gives –
  2. 6. _______ is the science and art of transforming messages to make them secure and immune to attacks
  3. 8. The ciphers of today are called round ciphers because they involve---------round
  4. 9. ----------round constants (RCs) are required in Whirlpool?
  5. 11. ---------is not a type of symmetric-key cryptography technique?
  6. 14. Divide (HAPPY)26 by (SAD)26. We get quotient –
  7. 15. The ________ is the message after transformation
  8. 17. ---------round provides linear diffusion in the Whirlpool Algorithm?
  9. 19. In symmetric-key cryptography, the key locks and unlocks the box is
  10. 20. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
Down
  1. 1. . A/an ________ algorithm transforms ciphertext to plaintext
  2. 2. In asymmetric key cryptography, the private key is kept by ________
  3. 3. The shift cipher is sometimes reffered to as a ---------
  4. 5. What is the number of round computation steps in the SHA-256 algorithm?
  5. 7. can be considered as the class of computer threats
  6. 10. The ________ is the original message before transformation
  7. 12. Another name for the Whirlpool key is
  8. 13. is considered as the unsolicited commercial email?
  9. 16. An asymmetric-key (or public-key) cipher uses
  10. 18. Symmetric-key cryptography started thousands of years ago when people needed to exchange