Module 4 Puzzle

123456789101112131415161718
Across
  1. 8. This type of employee is the greatest security risk to any company
  2. 11. A widely used encryption algorithm(PGP)
  3. 12. Ciphers that encrypt blocks of text at a time (for example, 64 bytes at a time)
  4. 15. A primitive encryption algorithm in which there is one single substitute character for all plain text characters
  5. 16. Motivating factor for corporate/industrial espionage
  6. 17. A symmetric key system using 64-bit blocks
  7. 18. Synonym for cryptographic algorithm
Down
  1. 1. The study of encryption and decryption
  2. 2. This usually involves altering a message so that it cannot be read without the key and the decryption algorithm
  3. 3. A binary mathematical operation that is used for a simple encryption method
  4. 4. An encryption method in which the same key is used to both encrypt and decrypt a message. This is also referred to as symmetric key encryption
  5. 5. A primitive encryption algorithm in which there are multiple substitute characters for all plain text characters
  6. 6. Base 2 numbers
  7. 7. A hacker with years of experience
  8. 8. To break encryption and discover the underlying message
  9. 9. A type of cipher in which the original text is encrypted one byte at a time in a stream of bytes
  10. 10. A network constructed by using public wires to connect nodes
  11. 12. A well-known "aquatic" encryption algorithm
  12. 13. A type of encryption that uses different keys to encrypt and decrypt the message
  13. 14. One of the oldest known ciphers. It simply shifts each character by a given number of characters.