Module 3: Introduction to Cryptographic Hashes, Message Digests and Digital Certificates

123456789101112131415
Across
  1. 5. digital signature avoid denial of sender by property
  2. 6. Key in hashing for authentication
  3. 10. attack on cryptography
  4. 11. message authentication requirement
  5. 12. insecure hash algorithm make use of the bit-wise operator
  6. 13. hashing function output
  7. 15. hashing with shared key
Down
  1. 1. hash provide same output for same input
  2. 2. resistance hash function requirement
  3. 3. hashing achieves security goal
  4. 4. name OTP generator algorithm
  5. 7. one of the hashing algorithm with encryption
  6. 8. one of the use of hashing is to detect?
  7. 9. message authentication requirement
  8. 14. MAC based on cryptographic key