Cyptography Puzzle
Across
- 4. Cryptanalysis uses mathematical formulas to search for
- 6. Shannon's information theory finds
- 9. Product cipher is more secure than
- 11. The concept of product ciphers is due to
- 12. trying every posible combination
- 13. Information theory allows to prove the ..... security
- 15. one of the Cryptanalysis attacks
Down
- 1. substitutions and permutations is called
- 2. Which achieves perfect secrecy
- 3. Original text is called as
- 5. Encryption/Decryption is done by
- 7. Combine two ciphering schemes to build a
- 8. easily guessed sequences of letters or number
- 10. Study of analyzing information systems
- 14. Encrypted text is called as