Cybersecurity Vocabulary

123456789101112
Across
  1. 2. Force attack a cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered.
  2. 4. exchange a method in cryptography by which cryptographic keys are exchanged between two parties
  3. 5. Attack an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
  4. 7. Attack is an attack model for cryptanalysis where the attacker has access to both the plaintext and its encrypted
  5. 8. Middle Attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties
  6. 11. is cyberwarfare that bypasses or sabotages a victim's strengths while targeting their vulnerabilities Confusion increases the ambiguity of ciphertext
  7. 12. two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified report A Mathematical Theory of Cryptography
Down
  1. 1. a process of finding weaknesses in cryptographic algorithms and using these weaknesses to decipher the ciphertext without knowing the secret key
  2. 3. the process of encoding information.
  3. 6. a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision.
  4. 9. Attack a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme
  5. 10. Exploitation Attack any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.