Across
- 4. table (12 letters) A precomputed table for reversing cryptographic hash functions.
- 5. (3 letters) An older symmetric encryption standard.
- 12. (7 letters) The process of converting plaintext into ciphertext.
- 13. (6 letters) A password-based key derivation function.
- 14. (9 letters) A type of encryption where the same key is used for encryption and decryption.
- 15. (8 letters) A symmetric key block cipher.
- 16. (6 letters) A common hashing algorithm used in cryptography.
- 17. (3 letters) The science of secret codes.
- 18. (4 letters) The fixed size output from a hash function.
- 19. (6 letters) The core of a Linux operating system.
- 20. (4 letters) A cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value.
- 21. (4 letters) The output of a decryption process.
- 22. (3 letters) A data structure that uses hash functions.
- 24. (2 letters) A command to list files in Linux.
- 25. (4 letters) A symmetric key cipher originally designed for telegraphy.
- 26. (3 letters) A type of encryption where two keys are used.
Down
- 1. (4 letters) A command-line utility for searching plain-text data sets for lines that match a regular expression.
- 2. (8 letters) A symmetric key block cipher, successor to Blowfish.
- 3. (13 letters) A method of securely exchanging cryptographic keys over a public channel.
- 6. (4 letters) A command in Linux that allows users to run programs with the security privileges of another user.
- 7. (4 letters) A Unix shell and command language.
- 8. (3 letters) A popular Linux text editor.
- 9. (7 letters) The process of converting ciphertext back into plaintext.
- 10. (6 letters) A key derivation function that was selected as the winner of the Password Hashing Competition in July 2015.
- 11. (3 letters) A widely used symmetric encryption algorithm.
- 13. (4 letters) The latest member of the Secure Hash Algorithm family.
- 15. (6 letters) A password hashing function designed by Niels Provos and David Mazières.
- 17. (5 letters) A method of disguising plaintext by shifting the letters.
- 22. (3 letters) A widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.
- 23. (7 letters) A robust, full-featured open-source toolkit implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.