Across
- 2. Piece of crypto equipment was for IPv4 & IPv6 networks.KG-175D.
- 4. The U.S. Government adopted this standard in 2001,providing encryption using 128, 192, and 256 bits key lengths.
- 5. Number of codes the KY-99 can hold.
- 7. This fill device is used for proprietary data protocol
- 8. A key used to encrypt messages.
- 12. Applying these includes Cryptographic solutions, transmission security, emission security & physical security.
- 16. This type of key is used for classified and sensitive national security information.
- 17. The process of converting information to a disguised form in order to send it across the process of converting information to a disguised form in order to send it across potentially unsafe channel.
- 18. The Modern encryption schemes that encryption and decryption keys are the same.
- 19. Those who try to "break" a cryptosystem are practicing this.
- 21. How NSA ranks cryptographic products or algorithms with a certification.
Down
- 1. An a electronic device used primarily by the military for the distribution of cryptographic variables such as Transmission Encryption and Security Keys.
- 3. Formed in 1952, This agency took over responsibility for all U.S. Government encryption systems.
- 6. Used to secure the link by which the message will travel.
- 9. Key type used for unclassified government information and proprietary information.
- 10. Purpose is to ensure information pertaining to national security stays out of the wrong hands.
- 11. The art & science of making & breaking codes & ciphers.
- 12. It Requires a minimum bandwidth of 2400 Hz.
- 13. Along with NSA, they prevent foreign adversaries from gaining access to classified national security information.
- 14. This Classification of encryption-device category provides Confidential through Top Secret.
- 15. The KIV–7 provides traditional bulk encryption for this type of system.
- 20. This fill device is forward and backward compatible with equipment and systems.
