Cryptography Crossword Challenge

12345678910111213141516171819202122232425262728
Across
  1. 2. A command in Linux that allows users to run programs with the security privileges of another user.
  2. 6. An older symmetric encryption standard.
  3. 8. The process of converting plaintext into ciphertext.
  4. 9. A method of disguising plaintext by shifting the letters.
  5. 10. A command-line utility for searching plain-text data sets for lines that match a regular expression.
  6. 11. A symmetric key block cipher.
  7. 12. A robust, full-featured open-source toolkit implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.
  8. 15. A type of encryption where two keys are used.
  9. 18. A cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value.
  10. 19. A widely used symmetric encryption algorithm.
  11. 21. The fixed size output from a hash function.
  12. 24. A precomputed table for reversing cryptographic hash functions.
  13. 25. A symmetric key block cipher, successor to Blowfish.
  14. 27. The science of secret codes.
  15. 28. A widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.
Down
  1. 1. A command to list files in Linux.
  2. 3. A method of securely exchanging cryptographic keys over a public channel.
  3. 4. The process of converting ciphertext back into plaintext.
  4. 5. The output of a decryption process.
  5. 7. The core of a Linux operating system.
  6. 11. A password hashing function designed by Niels Provos and David Mazières.
  7. 13. A symmetric key cipher originally designed for telegraphy.
  8. 14. A common hashing algorithm used in cryptography.
  9. 16. A key derivation function that was selected as the winner of the Password Hashing Competition in July 2015.
  10. 17. A Unix shell and command language.
  11. 18. The latest member of the Secure Hash Algorithm family.
  12. 20. A password-based key derivation function.
  13. 22. A popular Linux text editor.
  14. 23. A data structure that uses hash functions.
  15. 26. A type of encryption where the same key is used for encryption and decryption.