Across
- 2. Meet in the middle attack” and “man in the middle attack” are the same.
- 7. Rabin Cryptosystem is a variant of the Elgamal Cryptosystem”
- 8. When a hash function is used to provide message authentication, the hash function value
Down
- 1. Elliptic curve cryptography follows the associative property
- 2. RC4 algorithm uses the concept of Block Cipher System.
- 3. PGP makes use of which cryptographic algorithm
- 4. Good Privacy PGP abbreviation
- 5. Another name for Message authentication codes
- 6. How many rounds are present in each iteration function of SHA-3?
- 7. RC4 algorithm not used in
