Cryptography

1234567891011
Across
  1. 1. Ciphertext for the word “example” using Ceasar’s cipher, where key is 2.
  2. 5. The science of using mathematics to encrypt and decrypt data.
  3. 6. Pretty Good Privacy.
  4. 7. Data, that can be read and understood without any special measures.
  5. 8. Type of cryptography, also called secret-key or symmetric-key encryption, in which one key is used both for encrypting and decrypting.
  6. 9. The science, that embraces both cryptography and cryptanalysis.
  7. 11. PGP creates “… key” which is a one-time-only secret key.
Down
  1. 2. Encrypting plaintext results in unreliable gibberish is called …
  2. 3. Ciphertext for the word “secret” using Ceasar’s cipher, where key is 3.
  3. 4. The science of analyzing and breaking secure communication.
  4. 10. Public-key cryptosystem, named for its inventors: Ron Rivest, Adi Shamir and Leonard Adleman.