Across
- 5. digital signature avoid denial of sender by property
- 6. Key in hashing for authentication
- 10. attack on cryptography
- 11. message authentication requirement
- 12. insecure hash algorithm make use of the bit-wise operator
- 13. hashing function output
- 15. hashing with shared key
Down
- 1. hash provide same output for same input
- 2. resistance hash function requirement
- 3. hashing achieves security goal
- 4. name OTP generator algorithm
- 7. one of the hashing algorithm with encryption
- 8. one of the use of hashing is to detect?
- 9. message authentication requirement
- 14. MAC based on cryptographic key
