Brain Teaser Crossword

0 downloads 0 Views 91KB Size Report
Solution to the crossword with name of first all correct solution provider(s) will ... at email address [email protected] with subject: Crossword Solution - CSIC ...
Brain Teaser

Dr. Debasish Jana Editor, CSI Communications

Crossword » Test your Knowledge on Cryptography Solution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answers to CSI Communications at email address [email protected] with subject: Crossword Solution - CSIC May 2013 1

2

3

CLUES ACROSS

4

1. An encryption chip sponsored and developed by the US Government (7) 4. Encrypted text (10) 5. A common technique used in cryptography to encode information quickly (7) 6. Science of hiding information (13) 8. Used in error detection (8) 11. A security algorithm for IEEE 802.11 wireless networks (3) 13. An algorithm for public-key encryption (3) 14. Widely available program implementing public-key cryptography (3) 15. A person who attempts to defeat security measures (6) 18. A cryptographic algorithm (3) 19. Used to prove the identity of a user (8) 20. Most widely used protocol to implement cryptography on internet (3) 22. An early cipher machine used by the United States for message encryption (6) 23. A statement that a given certificate of key pair binding has expired (10) 24. To try to burgle a cryptosystem (6) 25. Used to encrypt GSM cellular communications (2) 27. A sequence of bits providing mechanism to encrypt or decrypt data (3) 28. German encrypting device (6) 29. An early device for encryption (7)

5

6

7

8

9 10

11

12

13

14

15

16

17 18

19

DOWN

20

21

1. An algorithm to perform encoding or decoding information (6) 2. A type of cryptography in which laws of physics get relied upon to prevent eavesdropping (7) 3. A basic right to seclude (7) 6. Considered to be the father of mathematical cryptography (7) 7. Process of confirming the identity of a party (14) 9. A protocol in which a trusted third party is relied upon to perform the authentication of clients (8) 10. An open-source implementation of the security protocols (7) 12. Process of encoding information (10) 15. A popular protocol used to transfer information securely over internet (5) 16. A digitally signed statement vouching for the identity (11) 17. Creator of PGP, the most popular encryption software for email (10) 19. A message that is not encrypted (9) 21. A person or organization that creates certificates (2) 26. A symmetric encryption-decryption algorithm standard developed by IBM (3)

22

23 24 25

28

26

27

29

Did you know about Scytale? Scytale was a device used for encryption many years ago by ancient Greeks. Sender and recipient would have a cylinder (called scytale) having exactly identical radius. Then a narrow ribbon is wrapped around the scytale, and message text written longitudinally (vertically) and unwound. The text could be read by someone having scytale of exact same radius, wrap again and read. For example, a message could be “The key is secrecy”. When wrapped around in a circle and in 3 columns and 5 rows vertically written as shown in illustration there. The encrypted text would thus read after unwinding as: “TYCHIRESEKSCEEY”, and when decrypted properly would read again as: “THEKEYISSECRECY”.

Solution to April 2013 crossword 1 4

5

H

B

L

O

O

M

F

I

L

T

A

O

. . . . . . . . . . .

. Y . I . S . S . E .

. . . . . . . . . . .

. C . R . E . C . Y .

. . . . . . . . . . .

We are overwhelmed by the responses and solutions received from our enthusiastic readers.

Congratulations to Mrs. N. Ananthi (Dept of Computer Technology, Dr. N.G.P. Arts and Science College, Coimbatore, Tamil Nadu) and Dr. Suresh Kumar (Dept of CSE, Manav Rachna International University, Faridabad, Haryana) for ALMOST ALL correct answers to April 2013 month’s crossword.

8

M

N I

P

16

X

G

X

T

T

18

A

M

C

P

Q

O

U

R

I

A

S

L

I

B

10

M

L

A

B

Y

P

Y

T

H

B

A

S

R

L

A

O S

C

E

O

M

T

K E.

C

L

E

D

U

C

T

I

V

23

A

N

A

T

A

L

D

A

O

C

24

H

Y

T

N G

V

21

A

H

25

I

C

S

A

L

V 27

R

E

A

20

E

I

D

E

L

N

U

T T

I

M M

E

L 28

I G

13

I

T 30

E

I

Y

E

L

G H

P

X

I

E

A

U

B

Q

E D

26

S

R 19

22

15

3

O

V

T

12

T 14

O

T 6

Y

A

T

T E

E

N

R

B 9

O 17

Z

O

O 11

. T . H . E . K . E .

E T

7

D

. . . . . . . . . . .

2

P

V

O

G

O

N

A

R

I

E

T

29

Y

T

O

P

B

L

E

I 31

D 32

U

L S

J

E

C

T

S

P

A

C

E

T

O

R

M

N

CSI Communications | May 2013 | 39