untilted

1234567891011121314151617181920212223242526
Across
  1. 4. table (12 letters) A precomputed table for reversing cryptographic hash functions.
  2. 5. (3 letters) An older symmetric encryption standard.
  3. 12. (7 letters) The process of converting plaintext into ciphertext.
  4. 13. (6 letters) A password-based key derivation function.
  5. 14. (9 letters) A type of encryption where the same key is used for encryption and decryption.
  6. 15. (8 letters) A symmetric key block cipher.
  7. 16. (6 letters) A common hashing algorithm used in cryptography.
  8. 17. (3 letters) The science of secret codes.
  9. 18. (4 letters) The fixed size output from a hash function.
  10. 19. (6 letters) The core of a Linux operating system.
  11. 20. (4 letters) A cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value.
  12. 21. (4 letters) The output of a decryption process.
  13. 22. (3 letters) A data structure that uses hash functions.
  14. 24. (2 letters) A command to list files in Linux.
  15. 25. (4 letters) A symmetric key cipher originally designed for telegraphy.
  16. 26. (3 letters) A type of encryption where two keys are used.
Down
  1. 1. (4 letters) A command-line utility for searching plain-text data sets for lines that match a regular expression.
  2. 2. (8 letters) A symmetric key block cipher, successor to Blowfish.
  3. 3. (13 letters) A method of securely exchanging cryptographic keys over a public channel.
  4. 6. (4 letters) A command in Linux that allows users to run programs with the security privileges of another user.
  5. 7. (4 letters) A Unix shell and command language.
  6. 8. (3 letters) A popular Linux text editor.
  7. 9. (7 letters) The process of converting ciphertext back into plaintext.
  8. 10. (6 letters) A key derivation function that was selected as the winner of the Password Hashing Competition in July 2015.
  9. 11. (3 letters) A widely used symmetric encryption algorithm.
  10. 13. (4 letters) The latest member of the Secure Hash Algorithm family.
  11. 15. (6 letters) A password hashing function designed by Niels Provos and David Mazières.
  12. 17. (5 letters) A method of disguising plaintext by shifting the letters.
  13. 22. (3 letters) A widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.
  14. 23. (7 letters) A robust, full-featured open-source toolkit implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.