Cybersecurity

123456789101112131415161718192021222324
Across
  1. 3. Outdated symmetric key method of data encryption
  2. 6. Plastic card that contains a memory chip and microprocessor or just a memory chip
  3. 8. Symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream
  4. 14. Traditionally need large integers composed of two or more large prime factors
  5. 18. A process used to encrypt and decrypt large plaintext inputs by creating a cryptographic chain wherein each ciphertext block is dependent on the last.
  6. 19. Set of communication rules or protocols for setting up secure connections over a network
  7. 20. Variable length, symmetric, 64-bit block cipher
  8. 21. Virtual Private Network; Protects users when browsing the web
  9. 22. Encryption with authentication
  10. 24. constructing and analyzing protocols that prevent third parties or the public from reading private messages.
Down
  1. 1. Prevents modification of data
  2. 2. Block cipher mode/acts like a stream cipher
  3. 4. An encryption-based Internet security protocol. It was first developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data integrity in Internet communications
  4. 5. Extends use of DES cipher
  5. 7. US Federal Government Standard
  6. 9. The process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel
  7. 10. A cryptographic network protocol for operating network services securely over an unsecured network
  8. 11. Hash Based Message Authentication Code; A cryptographic network protocol for operating network services securely over an unsecured network
  9. 12. Used for encryption, digital signatures, pseudo-random generators, and more
  10. 13. The practice of concealing information within another message or physical object to avoid detection.
  11. 15. Simplest encryption mode/Too simple for most cases
  12. 16. Family of message digest algorithms
  13. 17. Encryption program that provides cryptographic privacy and authentication for data communication
  14. 23. Public key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem.