Across
- 2. an attack in which an attacker is positioned between two communicating parties in order to intercept and/or after data traveling between them
- 3. an attack that exploits mathematical in encryption algorithms
- 4. is an attack model for cryptanalysis where the attacker has access to both the plaintext
- 5. a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
Down
- 1. is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme