cryptography and network security

12345678
Across
  1. 2. Meet in the middle attack” and “man in the middle attack” are the same.
  2. 7. Rabin Cryptosystem is a variant of the Elgamal Cryptosystem”
  3. 8. When a hash function is used to provide message authentication, the hash function value
Down
  1. 1. Elliptic curve cryptography follows the associative property
  2. 2. RC4 algorithm uses the concept of Block Cipher System.
  3. 3. PGP makes use of which cryptographic algorithm
  4. 4. Good Privacy PGP abbreviation
  5. 5. Another name for Message authentication codes
  6. 6. How many rounds are present in each iteration function of SHA-3?
  7. 7. RC4 algorithm not used in