Across
- 2. The usual motivating factor for corporate/industrial espionage
- 7. A widely used encryption algorithm(PGP)
- 9. To break encryption and discover the underlying message
- 12. Numbers using the base 2
- 13. A primitive encryption algorithm in which there is one single substitute character for all plain text characters
- 14. A type of cipher in which the original text is encrypted one byte at a time in a stream of bytes
- 15. A type of encryption that uses different keys to encrypt and decrypt the message
- 16. An encryption method in which the same key is used to both encrypt and decrypt a message. This is also referred to as symmetric key encryption
- 17. A hacker with years of experience
- 19. A primitive encryption algorithm in which there are multiple substitute characters for all plain text characters
- 20. Ciphers that encrypt blocks of text at a time (for example, 64 bytes at a time)
Down
- 1. Synonym for cryptographic algorithm
- 3. One of the oldest known encryption methods. It simply shifts each character by a given number of characters
- 4. A network constructed by using public wires to connect nodes
- 5. This type of employee is the greatest security risk to any company
- 6. A well-known encryption algorithm
- 8. A binary mathematical operation that is used for a simple encryption method
- 10. This usually involves altering a message so that it cannot be read without the key and the decryption algorithm
- 11. The study of encryption and decryption
- 18. A symmetric key system using 64-bit blocks
