INVENTOROF WWWTimBerners-LeeRSAAsymmetricalgo thatfactors verylarge integers;2048 min keysizeAsymmetricalgorithmDESintermediateCASubordinateswho validateissuing CAs AccessControlEncryptionreversible processthat converts datainto an unreadableformat, and thenback to its originalform.INVENTOROF TCPBOBKAHNRansomwareencrypting thecontents of asystem anddemandingpayment torecoverNIST (NationalInstitute ofStandards andTechnology)DESlegacyblock ciphersymmetricalgofastadvantageofsymmetricalgosfixitypreservationor integrityFirewallconsideredlayers 4-7PatchIntrusionDetectionSystem(IDS)SSLWebsecuritythat’s nowantiquatedIDEAdeprecatedblock cipheralgoreplaced byAESAESasymmetricalgo widelyusedVPN(VirtualPrivateNetwork)RootkitCAissues allcertificatesto endusersPGPa symmetricalgorithmused foremail andSMSPhishing256highestblock sizefor AESSteganographyThis concealsdata in anotherfiles such asgraphics, audioor video filecodesigningcertsused by appdevelopers;run at yourown riskinventorof theInternetDoDTokenizationport69TFTPMalwareSocialEngineeringIncidentResponseWhiteHatHackerCRLrevokedS/N thathave beeninvalidatedNullingcompletelypreventsvisibility ofthe dataDHAsymmetric Algogenerally usedto generate ashared key overa public networkBlackHatHackerSANcovermultipledomainsor URLs IVpseudorandom valueensures that plaintextinput does notproduce the sameciphertext output,even when the sameencryption key isused. Elgamalused for PKencryptionwith DHand PGPBiometricAuthenticationAntivirus53portnumberfor DNS143portused foremailsXORcomparestwo inputsand producesa singlebinary outputHashingone waymathematicalfunction easyto compute butirreversibleCBCcombiningblocks andan IV usingan XORoperationCryptographyINVENTOROF WWWTimBerners-LeeRSAAsymmetricalgo thatfactors verylarge integers;2048 min keysizeAsymmetricalgorithmDESintermediateCASubordinateswho validateissuing CAs AccessControlEncryptionreversible processthat converts datainto an unreadableformat, and thenback to its originalform.INVENTOROF TCPBOBKAHNRansomwareencrypting thecontents of asystem anddemandingpayment torecoverNIST (NationalInstitute ofStandards andTechnology)DESlegacyblock ciphersymmetricalgofastadvantageofsymmetricalgosfixitypreservationor integrityFirewallconsideredlayers 4-7PatchIntrusionDetectionSystem(IDS)SSLWebsecuritythat’s nowantiquatedIDEAdeprecatedblock cipheralgoreplaced byAESAESasymmetricalgo widelyusedVPN(VirtualPrivateNetwork)RootkitCAissues allcertificatesto endusersPGPa symmetricalgorithmused foremail andSMSPhishing256highestblock sizefor AESSteganographyThis concealsdata in anotherfiles such asgraphics, audioor video filecodesigningcertsused by appdevelopers;run at yourown riskinventorof theInternetDoDTokenizationport69TFTPMalwareSocialEngineeringIncidentResponseWhiteHatHackerCRLrevokedS/N thathave beeninvalidatedNullingcompletelypreventsvisibility ofthe dataDHAsymmetric Algogenerally usedto generate ashared key overa public networkBlackHatHackerSANcovermultipledomainsor URLs IVpseudorandom valueensures that plaintextinput does notproduce the sameciphertext output,even when the sameencryption key isused. Elgamalused for PKencryptionwith DHand PGPBiometricAuthenticationAntivirus53portnumberfor DNS143portused foremailsXORcomparestwo inputsand producesa singlebinary outputHashingone waymathematicalfunction easyto compute butirreversibleCBCcombiningblocks andan IV usingan XORoperationCryptography

Crypto Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  1. Tim Berners-Lee
    INVENTOR OF WWW
  2. Asymmetric algo that factors very large integers; 2048 min key size
    RSA
  3. DES
    A symmetric algorithm
  4. Subordinates who validate issuing CAs
    intermediate CA
  5. Access Control
  6. reversible process that converts data into an unreadable format, and then back to its original form.
    Encryption
  7. BOB KAHN
    INVENTOR OF TCP
  8. encrypting the contents of a system and demanding payment to recover
    Ransomware
  9. NIST (National Institute of Standards and Technology)
  10. legacy block cipher symmetric algo
    DES
  11. advantage of symmetric algos
    fast
  12. preservation or integrity
    fixity
  13. considered layers 4-7
    Firewall
  14. Patch
  15. Intrusion Detection System (IDS)
  16. Web security that’s now antiquated
    SSL
  17. deprecated block cipher algo replaced by AES
    IDEA
  18. a symmetric algo widely used
    AES
  19. VPN (Virtual Private Network)
  20. Rootkit
  21. issues all certificates to end users
    CA
  22. a symmetric algorithm used for email and SMS
    PGP
  23. Phishing
  24. highest block size for AES
    256
  25. This conceals data in another files such as graphics, audio or video file
    Steganography
  26. used by app developers; run at your own risk
    code signing certs
  27. DoD
    inventor of the Internet
  28. Tokenization
  29. TFTP
    port 69
  30. Malware
  31. Social Engineering
  32. Incident Response
  33. White Hat Hacker
  34. revoked S/N that have been invalidated
    CRL
  35. completely prevents visibility of the data
    Nulling
  36. Asymmetric Algo generally used to generate a shared key over a public network
    DH
  37. Black Hat Hacker
  38. cover multiple domains or URLs
    SAN
  39. pseudorandom value ensures that plaintext input does not produce the same ciphertext output, even when the same encryption key is used. 
    IV
  40. used for PK encryption with DH and PGP
    Elgamal
  41. Biometric Authentication
  42. Antivirus
  43. port number for DNS
    53
  44. port used for emails
    143
  45. compares two inputs and produces a single binary output
    XOR
  46. one way mathematical function easy to compute but irreversible
    Hashing
  47. combining blocks and an IV using an XOR operation
    CBC
  48. Cryptography