ITS2210 Module 4 Crossword

1234567891011121314151617181920
Across
  1. 2. The usual motivating factor for corporate/industrial espionage
  2. 7. A widely used encryption algorithm(PGP)
  3. 9. To break encryption and discover the underlying message
  4. 12. Numbers using the base 2
  5. 13. A primitive encryption algorithm in which there is one single substitute character for all plain text characters
  6. 14. A type of cipher in which the original text is encrypted one byte at a time in a stream of bytes
  7. 15. A type of encryption that uses different keys to encrypt and decrypt the message
  8. 16. An encryption method in which the same key is used to both encrypt and decrypt a message. This is also referred to as symmetric key encryption
  9. 17. A hacker with years of experience
  10. 19. A primitive encryption algorithm in which there are multiple substitute characters for all plain text characters
  11. 20. Ciphers that encrypt blocks of text at a time (for example, 64 bytes at a time)
Down
  1. 1. Synonym for cryptographic algorithm
  2. 3. One of the oldest known encryption methods. It simply shifts each character by a given number of characters
  3. 4. A network constructed by using public wires to connect nodes
  4. 5. This type of employee is the greatest security risk to any company
  5. 6. A well-known encryption algorithm
  6. 8. A binary mathematical operation that is used for a simple encryption method
  7. 10. This usually involves altering a message so that it cannot be read without the key and the decryption algorithm
  8. 11. The study of encryption and decryption
  9. 18. A symmetric key system using 64-bit blocks