Across
- 2. A command in Linux that allows users to run programs with the security privileges of another user.
- 6. An older symmetric encryption standard.
- 8. The process of converting plaintext into ciphertext.
- 9. A method of disguising plaintext by shifting the letters.
- 10. A command-line utility for searching plain-text data sets for lines that match a regular expression.
- 11. A symmetric key block cipher.
- 12. A robust, full-featured open-source toolkit implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.
- 15. A type of encryption where two keys are used.
- 18. A cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value.
- 19. A widely used symmetric encryption algorithm.
- 21. The fixed size output from a hash function.
- 24. A precomputed table for reversing cryptographic hash functions.
- 25. A symmetric key block cipher, successor to Blowfish.
- 27. The science of secret codes.
- 28. A widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.
Down
- 1. A command to list files in Linux.
- 3. A method of securely exchanging cryptographic keys over a public channel.
- 4. The process of converting ciphertext back into plaintext.
- 5. The output of a decryption process.
- 7. The core of a Linux operating system.
- 11. A password hashing function designed by Niels Provos and David Mazières.
- 13. A symmetric key cipher originally designed for telegraphy.
- 14. A common hashing algorithm used in cryptography.
- 16. A key derivation function that was selected as the winner of the Password Hashing Competition in July 2015.
- 17. A Unix shell and command language.
- 18. The latest member of the Secure Hash Algorithm family.
- 20. A password-based key derivation function.
- 22. A popular Linux text editor.
- 23. A data structure that uses hash functions.
- 26. A type of encryption where the same key is used for encryption and decryption.
