Across
- 2. It is an attack that is the easiest to defend against because the opponent has the least amount of information to work with
- 6. the attack that tries every possible key on a piece of cipher text until an intelligible translation into plaintext is obtained
- 7. this attack is possible if the analyst is able somehow to get the source system to insert into the system a message chosen by the analyst
- 8. Techniques used for deciphering a message without any knowledge of the enciphering details
Down
- 1. the scrambled message produced as output
- 3. The marking bound to a resource that names or designates the security attributes of that resource
- 4. The use of a trusted third party to assure certain properties of a data exchange
- 5. cryptography and cryptanalysis together
