World of Cryptography - Puzzle 2

123456789101112131415161718
Across
  1. 3. Attacks based on timing and power measurement
  2. 5. Public key cryptographic algorithm
  3. 8. Mathematics behind Diffie-Hellman key exchange protocol
  4. 9. Predefined first input in hash
  5. 12. Third party in centralized authentication
  6. 14. One-time pad cipher
  7. 15. User authenticating himself to ATM machine
  8. 16. Structure that DES follows
  9. 17. Concealing the existence of message
  10. 18. No clue regarding ciphertext and key
Down
  1. 1. Hash that is fast and strong as that of an animal
  2. 2. PSrinciple that says everything is public except key
  3. 4. Breaking secret code
  4. 5. Act of making the digital certificate invalid
  5. 6. One of encryption and signature techniques
  6. 7. Digital Certificate provider
  7. 10. One kind of passive attack
  8. 11. Box that provides diffusion
  9. 12. Key storage and distribution
  10. 13. Mutual authentication Protocol