Across
- 3. Attacks based on timing and power measurement
- 5. Public key cryptographic algorithm
- 8. Mathematics behind Diffie-Hellman key exchange protocol
- 9. Predefined first input in hash
- 12. Third party in centralized authentication
- 14. One-time pad cipher
- 15. User authenticating himself to ATM machine
- 16. Structure that DES follows
- 17. Concealing the existence of message
- 18. No clue regarding ciphertext and key
Down
- 1. Hash that is fast and strong as that of an animal
- 2. PSrinciple that says everything is public except key
- 4. Breaking secret code
- 5. Act of making the digital certificate invalid
- 6. One of encryption and signature techniques
- 7. Digital Certificate provider
- 10. One kind of passive attack
- 11. Box that provides diffusion
- 12. Key storage and distribution
- 13. Mutual authentication Protocol
