Module 4 Puzzle
Across
- 8. This type of employee is the greatest security risk to any company
- 11. A widely used encryption algorithm(PGP)
- 12. Ciphers that encrypt blocks of text at a time (for example, 64 bytes at a time)
- 15. A primitive encryption algorithm in which there is one single substitute character for all plain text characters
- 16. Motivating factor for corporate/industrial espionage
- 17. A symmetric key system using 64-bit blocks
- 18. Synonym for cryptographic algorithm
Down
- 1. The study of encryption and decryption
- 2. This usually involves altering a message so that it cannot be read without the key and the decryption algorithm
- 3. A binary mathematical operation that is used for a simple encryption method
- 4. An encryption method in which the same key is used to both encrypt and decrypt a message. This is also referred to as symmetric key encryption
- 5. A primitive encryption algorithm in which there are multiple substitute characters for all plain text characters
- 6. Base 2 numbers
- 7. A hacker with years of experience
- 8. To break encryption and discover the underlying message
- 9. A type of cipher in which the original text is encrypted one byte at a time in a stream of bytes
- 10. A network constructed by using public wires to connect nodes
- 12. A well-known "aquatic" encryption algorithm
- 13. A type of encryption that uses different keys to encrypt and decrypt the message
- 14. One of the oldest known ciphers. It simply shifts each character by a given number of characters.