Symmetric Cipher

12345678
Across
  1. 2. It is an attack that is the easiest to defend against because the opponent has the least amount of information to work with
  2. 6. the attack that tries every possible key on a piece of cipher text until an intelligible translation into plaintext is obtained
  3. 7. this attack is possible if the analyst is able somehow to get the source system to insert into the system a message chosen by the analyst
  4. 8. Techniques used for deciphering a message without any knowledge of the enciphering details
Down
  1. 1. the scrambled message produced as output
  2. 3. The marking bound to a resource that names or designates the security attributes of that resource
  3. 4. The use of a trusted third party to assure certain properties of a data exchange
  4. 5. cryptography and cryptanalysis together