Across
- 4. In base 26, multiplication of YES by NO gives –
- 6. _______ is the science and art of transforming messages to make them secure and immune to attacks
- 8. The ciphers of today are called round ciphers because they involve---------round
- 9. ----------round constants (RCs) are required in Whirlpool?
- 11. ---------is not a type of symmetric-key cryptography technique?
- 14. Divide (HAPPY)26 by (SAD)26. We get quotient –
- 15. The ________ is the message after transformation
- 17. ---------round provides linear diffusion in the Whirlpool Algorithm?
- 19. In symmetric-key cryptography, the key locks and unlocks the box is
- 20. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
Down
- 1. . A/an ________ algorithm transforms ciphertext to plaintext
- 2. In asymmetric key cryptography, the private key is kept by ________
- 3. The shift cipher is sometimes reffered to as a ---------
- 5. What is the number of round computation steps in the SHA-256 algorithm?
- 7. can be considered as the class of computer threats
- 10. The ________ is the original message before transformation
- 12. Another name for the Whirlpool key is
- 13. is considered as the unsolicited commercial email?
- 16. An asymmetric-key (or public-key) cipher uses
- 18. Symmetric-key cryptography started thousands of years ago when people needed to exchange
