Across
- 3. Process of converting ciphertext back to plaintext
- 6. Prevents denial of having performed an action
- 8. Encrypts data one bit or byte at a time
- 9. Process of handling cryptographic keys securely
- 11. Symmetric encryption standard adopted by NIST
- 13. Security system that monitors and controls network traff
- 15. One-way function producing fixed-length output
- 17. Cryptography based on elliptic curve mathematics
- 19. Digital document binding identity to a public key
- 22. Key used to encrypt data in asymmetric cryptography
- 23. Science of securing communication and data
- 24. Standard for public key certificates
- 26. Secure protocol using certificates for communication
- 27. Attack intercepting communication between two parties
- 28. General process of converting plaintext into ciphertext
- 30. Verifying identity of a user or system
Down
- 1. Original readable message before encryption
- 2. Encrypts data in fixed-size blocks
- 4. Ensures authenticity and integrity of data
- 5. Unauthorized entity attempting system access
- 7. Key exchange protocol using discrete logarithms
- 10. Exhaustive search attack on cryptographic keys
- 12. Secret key used for decryption in asymmetric cryptography
- 14. Security principle ensuring data is not altered
- 16. Output of encryption process
- 18. Method to prove knowledge without revealing information
- 20. Process of securely sharing cryptographic keys
- 21. Malicious software designed to disrupt or gain access
- 25. Predecessor of TLS for secure communication
- 29. Public-key cryptosystem based on prime factorization
