Cyptography Puzzle

123456789101112131415
Across
  1. 4. Cryptanalysis uses mathematical formulas to search for
  2. 6. Shannon's information theory finds
  3. 9. Product cipher is more secure than
  4. 11. The concept of product ciphers is due to
  5. 12. trying every posible combination
  6. 13. Information theory allows to prove the ..... security
  7. 15. one of the Cryptanalysis attacks
Down
  1. 1. substitutions and permutations is called
  2. 2. Which achieves perfect secrecy
  3. 3. Original text is called as
  4. 5. Encryption/Decryption is done by
  5. 7. Combine two ciphering schemes to build a
  6. 8. easily guessed sequences of letters or number
  7. 10. Study of analyzing information systems
  8. 14. Encrypted text is called as