Across
- 6. any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
- 11. an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
- 12. the attacker has access to pairs of known plaintexts and their corresponding ciphertexts.
Down
- 1. a general term for when a perpetrator positions himself in a conversation between a user and an application
- 2. tries to find two inputs producing the same hash value
- 3. consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
- 4. if we change a character of the plaintext, then several characters of the ciphertext should change
- 5. convert (information or data) into a cipher or code, especially to prevent unauthorized access.
- 7. each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.
- 8. a method in cryptography by which cryptographic keys are exchanged between two parties
- 9. a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
- 10. the art or process of deciphering coded messages without being told the key.