Computer Science History and Cybersecurity

1234567891011121314
Across
  1. 2. hashing is the foundation of this technology that has been used to implement crypto-currencies
  2. 5. Park once the top-secret home of the World War Two Codebreakers
  3. 6. cipher that is easily broken using brute force
  4. 9. was the U.S. Navy's Combat Intelligence Unit, called OP–20–G
  5. 11. designed to translate content with the intent of translating it back
  6. 13. German cipher during WWII
Down
  1. 1. Japanese naval code during WWII
  2. 3. bncd (single shift cipher, decrypt for answer)
  3. 4. one of the founders of Computer Science who worked as a code-breaker in England during WWII
  4. 7. designed to translate content with NO intent of translating it back
  5. 8. early computers were _________ and hot!
  6. 10. first naval battle of WWII where code breaking played a major role
  7. 12. both the sender and the receiver must have this for encryption to work
  8. 14. decisive naval battle of WWII where code breaking played a major role