Cybersecurity Vocab

123456789101112
Across
  1. 6. any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
  2. 11. an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
  3. 12. the attacker has access to pairs of known plaintexts and their corresponding ciphertexts.
Down
  1. 1. a general term for when a perpetrator positions himself in a conversation between a user and an application
  2. 2. tries to find two inputs producing the same hash value
  3. 3. consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
  4. 4. if we change a character of the plaintext, then several characters of the ciphertext should change
  5. 5. convert (information or data) into a cipher or code, especially to prevent unauthorized access.
  6. 7. each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.
  7. 8. a method in cryptography by which cryptographic keys are exchanged between two parties
  8. 9. a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
  9. 10. the art or process of deciphering coded messages without being told the key.