<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.pathfindersonline.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=RABaker96</id>
	<title>Pathfinder Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.pathfindersonline.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=RABaker96"/>
	<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/w/Special:Contributions/RABaker96"/>
	<updated>2026-04-09T18:22:30Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.35.5</generator>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=647592</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=647592"/>
		<updated>2026-03-30T20:07:34Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:ICS-flags.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. It is created (and solved) using an algorithm. A simple classic cipher, for example, is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). The algorithm could be written as (P)+X=(C), where &amp;quot;P&amp;quot; means the plain text letter, and &amp;quot;C&amp;quot; means the new cipher text letter, and &amp;quot;X&amp;quot; is the number of spaces to shift the letter. A 3 shift Caesar cipher, as below, adds 23 places (26 letters in the alphabet -3 shifted spaces) to get us our encoding, but we &amp;quot;subtract&amp;quot; three letters from the encoded message to solve for the original.   &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
Ciphers can be even more complex (and often are, particularly when using machines and computers). The Enigma machine of World War II used several mechanical elements to encode via a polyalphabetic cipher, meaning that in the enciphered text, a single letter may have different unencrypted meanings, based on where it was and how the algorithm encoded it.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file, subtly changing fonts, or using invisible ink. &lt;br /&gt;
&lt;br /&gt;
A simple two-part invisible ink can be created with things you likely already have in your house. The ink is made from a mixture of 1TBSP Baking Soda mixed in 1/2C water. Write the message with this ink on the paper. When first trying it out, use cotton swabs, but later you can experiment with finer brushes. Once the message is written, allow the paper to dry. &lt;br /&gt;
&lt;br /&gt;
[[File:Ink1.jpg|frame|center|Making the Invisible Ink]]&lt;br /&gt;
[[File:Ink2.jpg|frame|center|Write the message and allow to dry]]&lt;br /&gt;
&lt;br /&gt;
To reveal the invisible message, mix 1tsp turmeric with 1/2c rubbing alcohol to make the reagent. Then paint the reagent over the paper. Be careful, as it is easy to stain your fingers and the table a lovely yellow. &lt;br /&gt;
&lt;br /&gt;
[[File:Ink3.jpg|frame|center|Mix the reagent.]]&lt;br /&gt;
[[File:Ink4.jpg|frame|center|Use the reagent to reveal the message]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unencrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message. In a Caesar cipher, it is the number of letters to shift.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography, and is a way of transmitting secure messages via the internet/email, where even if intercepted the message cannot be decrypted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. If someone breaks into the database, they can only recover the hash value, which obscures the original information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
a. Processing done by a computer to determine if a user enters a correct password&lt;br /&gt;
&lt;br /&gt;
Cipher (a mathematical formula), using one-way encryption or a hash&lt;br /&gt;
&lt;br /&gt;
b. A Bible verse reference&lt;br /&gt;
&lt;br /&gt;
Plain text (just an abbreviation)&lt;br /&gt;
&lt;br /&gt;
c. The colors used on a traffic light to mean &amp;quot;Stop,&amp;quot; &amp;quot;Go,&amp;quot; or &amp;quot;Caution&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Code (each color having a different word meaning)&lt;br /&gt;
&lt;br /&gt;
d. HTTPS:// used in a URL over the Internet&lt;br /&gt;
&lt;br /&gt;
Cipher to security transfer data between two points&lt;br /&gt;
&lt;br /&gt;
e. Forming a message by entering it into a grid row-by-row and reading it out column-by-column&lt;br /&gt;
&lt;br /&gt;
Cipher (specifically a square cipher)&lt;br /&gt;
&lt;br /&gt;
f. Invisible ink&lt;br /&gt;
&lt;br /&gt;
Steganography (hiding a message in plain sight)&lt;br /&gt;
&lt;br /&gt;
g. Navajo language used by the Code Talkers in World War II&lt;br /&gt;
&lt;br /&gt;
Code (replacing words with words)&lt;br /&gt;
&lt;br /&gt;
h. Data representation via a grid of dots (QR codes) or lines (Bar codes)&lt;br /&gt;
&lt;br /&gt;
Code, though could also be used to hide additional information as a form of steganography&lt;br /&gt;
&lt;br /&gt;
i. Enigma machine used in World War II&lt;br /&gt;
&lt;br /&gt;
Cipher - used mathematical algorithms to encode and decode messages&lt;br /&gt;
&lt;br /&gt;
j. Recording your computer password on a piece of paper&lt;br /&gt;
&lt;br /&gt;
Plain Text (no encoding)&lt;br /&gt;
&lt;br /&gt;
k. Signal used by Jonathan and David recounted in 1 Samuel 20:18-23&lt;br /&gt;
&lt;br /&gt;
Code (each message coupled with arrow shot encoded its particular message)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
a. Egyptian hieroglyphs, 1900 BC&lt;br /&gt;
&lt;br /&gt;
[[File:Hieroglyphs from Stela of Ity.jpg|frame|A selection of hieroglyphs from the Stela of Ity, on display at the British Museum]]&lt;br /&gt;
[[File:Selection from Stela of Semty Junior.jpg|frame|Hieroglyphs from the stela of Semty Junior, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Egyptian hieroglyphs are not really a code or a cipher, they are a form of written language. Hieroglyphs are symbols that may be phonograms (represent a sound), Ideograms (represent a word), or determinatives (provide context for the other hieroglyphs in a message). There are three types of phonograms - unilaterals (the symbol represents a single sound), bilaterals (representing a double sound, such as “pr”), and trilaterals (representing three sounds combined, such as “mwt”). &lt;br /&gt;
&lt;br /&gt;
Hieroglyph words could be written right to left, left to right, top to bottom, and at times a bit of horizontal and vertical combined, depending upon how well it fit within the physical context (thus the writing often was as much art as communication). Vowels were generally excluded (most common transliterations just toss an “e” between each consonant), and the exact pronunciation remains somewhat uncertain. Writing your name or some other message, then, may include first stripping out the vowels before encoding into hieroglyphs. You will often see people’s names enclosed in an oval, making them easier to spot. Hieroglyphs could be carved, painted, or both. &lt;br /&gt;
&lt;br /&gt;
[[File:The Rosetta Stone.jpg|frame|The Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4336.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4341.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
Although there were many attempts to translate hieroglyphs for centuries, the discovery of the Rosetta Stone in 1799 by the French provided the impetus for the final work to crack the “code.” The Rosetta Stone, carved around 196 BC, had the same message written in hieroglyphs (the priestly language), demotic (a more common form of written Egyptian), and ancient Greek (as Egypt had earlier been conquered by Alexander the Great). Using the Rosetta Stone as a guide, French scholar Jean-François Champollion became the first to be recognized for deciphering hieroglyphs in 1822. &lt;br /&gt;
&lt;br /&gt;
Many scholars and historians of cryptology date the earliest written cipher to the tomb of Khnumhotep II, an overseer during the Middle Kingdom period of Egypt (around 1900 BC). In the tomb, located in Beni Hassan, Egypt, there are several non-standard hieroglyphs, which may have been meant to highlight key words or phrases, or make the writings appear more significant. While not necessarily meant to hide the meaning, this is often considered a first use of a substitution cipher - replacing one letter or word with another. &lt;br /&gt;
&lt;br /&gt;
If you want to learn more to try and do your own hieroglyphic writing, there are several good books and online resources, including: &lt;br /&gt;
https://www.egyptianhieroglyphs.net/&lt;br /&gt;
https://www.bibalex.org/learnhieroglyphs/Lesson/Introduction_En.aspx&lt;br /&gt;
Or try an online “translator,” such as https://lingojam.com/HieroglyphicsTranslator&lt;br /&gt;
Or try out https://artsandculture.google.com/experiment/fabricius/gwHX41Sm0N7-Dw?hl=en&lt;br /&gt;
&lt;br /&gt;
b. Hebrew Atbash cipher, 500 BC&lt;br /&gt;
&lt;br /&gt;
The Atbash cipher is a simple substitution cipher, reversing the order of the alphabet (the name is actually the first two and last two letters of the Hebrew alphabet). Hebrew has 22 letters, and using this cipher you replace the first with last, the second with second to last, etc. If we were to use the English alphabet (26 letters), A=Z, B=Y, C=X, D=W and so on. It is a simple cipher, making it useful but easy to crack.&lt;br /&gt;
&lt;br /&gt;
It is believed that there is a use of the Atbash cipher in the book of Jeremiah. In Jeremiah 25:26 and 51:41, there is a mention of “Sheshach,” written right to left using the letters shin shin kaf. If an Atbash cipher is applied, these would be replaced by bet bet lamed, the Hebrew word for Babel (or Babylon). Thus it is believed that here Jeremiah is referring to Babylon, not some unknown city or country of “Sheshach.”&lt;br /&gt;
See 2b for an Atbash Cipher in action&lt;br /&gt;
&lt;br /&gt;
c. Julius Caesar's substitution cipher, 100 BC&lt;br /&gt;
&lt;br /&gt;
The Caesar shift cipher is another simply substitution cipher and was used for military communications. The cipher “shifts” the chosen letter left or right a set number based on the cipher key. So if there is a shift 2 to the right, then the letter A in plain text is shifted to C in the cipher text - it has “shifted” 2 letters to the right. &lt;br /&gt;
&lt;br /&gt;
Building a simple wheel coder/decoder is an easy way to use a Caesar cipher. It is fairly easy to break a Caesar cipher, either through brute force or (just keep replacing a letter in a word until the word makes sense) or through a frequency analysis of the coded message, recognizing that certain letters (E, T, S) are very common, and will occur more often than other letters. &lt;br /&gt;
&lt;br /&gt;
See question 6 for a Caesar Cipher in action. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a left +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our left +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You have plenty of choices for this one. &lt;br /&gt;
&lt;br /&gt;
Here is an example of using a columnar transposition cipher (with a key) to encode our message. In this form of cipher, we write our plain text in a grid horizontally, and write our cipher text by reading the columns vertically. But the twist is the key. Before writing our text, we write the key word across our grid. This determines how many rows we will have. The rows are then written as the cipher text based on the alphabetical order of the letters in the key word - so the first column isn't necessarily the first column we will write. If there are two of the same letter in the key word, the first appearance comes first in numbering the columns. &lt;br /&gt;
&lt;br /&gt;
So here is the way to encrypt using this method. Our plain text comes from the book of Psalm. Here we have converted the numbers to words so we do not need to worry about having numbers mixed with out letters. &lt;br /&gt;
&lt;br /&gt;
[[File:Plain Text Psalm to encode.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Our keyword is SHEPHARD. Yes, it is spelled like a person's name, not the job with sheep. Using similar sounding words can add to the complexity if someone overhears the key word. The keyword should be sent (or pre-arranged) separately from the cipher text. Perhaps you can use steganography to hide the key word. So, our key, shephard, has 8 letters, so we will have 8 columns in our grid. When we encode, we will begin with the column beneath the letter &amp;quot;A,&amp;quot; then the column beneath the letter &amp;quot;d,&amp;quot; then &amp;quot;e,&amp;quot; then the first &amp;quot;H,&amp;quot; then the second &amp;quot;H&amp;quot; and so on. So here is the verse written out in our grid.&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we write out the coded message, starting with the column under &amp;quot;a,&amp;quot; and so on. &lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we break it up (this time in groups of 5, but use whatever you want so long as it isnt the original number of columns)&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher text for psalm.png|frameless|center]]&lt;br /&gt;
&lt;br /&gt;
To decode, we would take the key word, make a grid, count the total number of characters in the encoded message and divide by the number of columns in our table to determine how many rows we need. Then we begin writing the cipher text vertically in the table, beginning with the &amp;quot;A&amp;quot; column and so on. Once complete, we read/write it out horizontally across the rows to recover our original text. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=647591</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=647591"/>
		<updated>2026-03-30T20:03:42Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:ICS-flags.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. It is created (and solved) using an algorithm. A simple classic cipher, for example, is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). The algorithm could be written as (P)+X=(C), where &amp;quot;P&amp;quot; means the plain text letter, and &amp;quot;C&amp;quot; means the new cipher text letter, and &amp;quot;X&amp;quot; is the number of spaces to shift the letter. A 3 shift Caesar cipher, as below, adds 23 places (26 letters in the alphabet -3 shifted spaces) to get us our encoding, but we &amp;quot;subtract&amp;quot; three letters from the encoded message to solve for the original.   &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
Ciphers can be even more complex (and often are, particularly when using machines and computers). The Enigma machine of World War II used several mechanical elements to encode via a polyalphabetic cipher, meaning that in the enciphered text, a single letter may have different unencrypted meanings, based on where it was and how the algorithm encoded it.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file, subtly changing fonts, or using invisible ink. &lt;br /&gt;
&lt;br /&gt;
A simple two-part invisible ink can be created with things you likely already have in your house. The ink is made from a mixture of 1TBSP Baking Soda mixed in 1/2C water. Write the message with this ink on the paper. When first trying it out, use cotton swabs, but later you can experiment with finer brushes. Once the message is written, allow the paper to dry. &lt;br /&gt;
&lt;br /&gt;
[[File:Ink1.jpg|frame|center|Making the Invisible Ink]]&lt;br /&gt;
[[File:Ink2.jpg|frame|center|Write the message and allow to dry]]&lt;br /&gt;
&lt;br /&gt;
To reveal the invisible message, mix 1tsp turmeric with 1/2c rubbing alcohol to make the reagent. Then paint the reagent over the paper. Be careful, as it is easy to stain your fingers and the table a lovely yellow. &lt;br /&gt;
&lt;br /&gt;
[[File:Ink3.jpg|frame|center|Mix the reagent.]]&lt;br /&gt;
[[File:Ink4.jpg|frame|center|Use the reagent to reveal the message]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unencrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message. In a Caesar cipher, it is the number of letters to shift.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography, and is a way of transmitting secure messages via the internet/email, where even if intercepted the message cannot be decrypted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. If someone breaks into the database, they can only recover the hash value, which obscures the original information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
a. Processing done by a computer to determine if a user enters a correct password&lt;br /&gt;
&lt;br /&gt;
Cipher (a mathematical formula), using one-way encryption or a hash&lt;br /&gt;
&lt;br /&gt;
b. A Bible verse reference&lt;br /&gt;
&lt;br /&gt;
Plain text (just an abbreviation)&lt;br /&gt;
&lt;br /&gt;
c. The colors used on a traffic light to mean &amp;quot;Stop,&amp;quot; &amp;quot;Go,&amp;quot; or &amp;quot;Caution&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Code (each color having a different word meaning)&lt;br /&gt;
&lt;br /&gt;
d. HTTPS:// used in a URL over the Internet&lt;br /&gt;
&lt;br /&gt;
Cipher to security transfer data between two points&lt;br /&gt;
&lt;br /&gt;
e. Forming a message by entering it into a grid row-by-row and reading it out column-by-column&lt;br /&gt;
&lt;br /&gt;
Cipher (specifically a square cipher)&lt;br /&gt;
&lt;br /&gt;
f. Invisible ink&lt;br /&gt;
&lt;br /&gt;
Steganography (hiding a message in plain sight)&lt;br /&gt;
&lt;br /&gt;
g. Navajo language used by the Code Talkers in World War II&lt;br /&gt;
&lt;br /&gt;
Code (replacing words with words)&lt;br /&gt;
&lt;br /&gt;
h. Data representation via a grid of dots (QR codes) or lines (Bar codes)&lt;br /&gt;
&lt;br /&gt;
Code, though could also be used to hide additional information as a form of steganography&lt;br /&gt;
&lt;br /&gt;
i. Enigma machine used in World War II&lt;br /&gt;
&lt;br /&gt;
Cipher - used mathematical algorithms to encode and decode messages&lt;br /&gt;
&lt;br /&gt;
j. Recording your computer password on a piece of paper&lt;br /&gt;
&lt;br /&gt;
Plain Text (no encoding)&lt;br /&gt;
&lt;br /&gt;
k. Signal used by Jonathan and David recounted in 1 Samuel 20:18-23&lt;br /&gt;
&lt;br /&gt;
Code (each message coupled with arrow shot encoded its particular message)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
a. Egyptian hieroglyphs, 1900 BC&lt;br /&gt;
&lt;br /&gt;
[[File:Hieroglyphs from Stela of Ity.jpg|frame|A selection of hieroglyphs from the Stela of Ity, on display at the British Museum]]&lt;br /&gt;
[[File:Selection from Stela of Semty Junior.jpg|frame|Hieroglyphs from the stela of Semty Junior, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Egyptian hieroglyphs are not really a code or a cipher, they are a form of written language. Hieroglyphs are symbols that may be phonograms (represent a sound), Ideograms (represent a word), or determinatives (provide context for the other hieroglyphs in a message). There are three types of phonograms - unilaterals (the symbol represents a single sound), bilaterals (representing a double sound, such as “pr”), and trilaterals (representing three sounds combined, such as “mwt”). &lt;br /&gt;
&lt;br /&gt;
Hieroglyph words could be written right to left, left to right, top to bottom, and at times a bit of horizontal and vertical combined, depending upon how well it fit within the physical context (thus the writing often was as much art as communication). Vowels were generally excluded (most common transliterations just toss an “e” between each consonant), and the exact pronunciation remains somewhat uncertain. Writing your name or some other message, then, may include first stripping out the vowels before encoding into hieroglyphs. You will often see people’s names enclosed in an oval, making them easier to spot. Hieroglyphs could be carved, painted, or both. &lt;br /&gt;
&lt;br /&gt;
[[File:The Rosetta Stone.jpg|frame|The Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4336.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4341.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
Although there were many attempts to translate hieroglyphs for centuries, the discovery of the Rosetta Stone in 1799 by the French provided the impetus for the final work to crack the “code.” The Rosetta Stone, carved around 196 BC, had the same message written in hieroglyphs (the priestly language), demotic (a more common form of written Egyptian), and ancient Greek (as Egypt had earlier been conquered by Alexander the Great). Using the Rosetta Stone as a guide, French scholar Jean-François Champollion became the first to be recognized for deciphering hieroglyphs in 1822. &lt;br /&gt;
&lt;br /&gt;
Many scholars and historians of cryptology date the earliest written cipher to the tomb of Khnumhotep II, an overseer during the Middle Kingdom period of Egypt (around 1900 BC). In the tomb, located in Beni Hassan, Egypt, there are several non-standard hieroglyphs, which may have been meant to highlight key words or phrases, or make the writings appear more significant. While not necessarily meant to hide the meaning, this is often considered a first use of a substitution cipher - replacing one letter or word with another. &lt;br /&gt;
&lt;br /&gt;
If you want to learn more to try and do your own hieroglyphic writing, there are several good books and online resources, including: &lt;br /&gt;
https://www.egyptianhieroglyphs.net/&lt;br /&gt;
https://www.bibalex.org/learnhieroglyphs/Lesson/Introduction_En.aspx&lt;br /&gt;
Or try an online “translator,” such as https://lingojam.com/HieroglyphicsTranslator&lt;br /&gt;
Or try out https://artsandculture.google.com/experiment/fabricius/gwHX41Sm0N7-Dw?hl=en&lt;br /&gt;
&lt;br /&gt;
b. Hebrew Atbash cipher, 500 BC&lt;br /&gt;
&lt;br /&gt;
The Abash cipher is a simple substitution cipher, reversing the order of the alphabet (the name is actually the first two and last two letters of the Hebrew alphabet). Hebrew has 22 letters, and using this cipher you replace the first with last, the second with second to last, etc. If we were to use the English alphabet (26 letters), A=Z, B=Y, C=X, D=W and so on. It is a simple cipher, making it useful but easy to crack.&lt;br /&gt;
&lt;br /&gt;
It is believed that there is a use of the Abash cipher in the book of Jeremiah. In Jeremiah 25:26 and 51:41, there is a mention of “Sheshach,” written right to left using the letters shin shin kaf. If an Abash cipher is applied, these would be replaced by bet bet lamed, the Hebrew word for Babel (or Babylon). Thus it is believed that here Jeremiah is referring to Babylon, not some unknown city or country of “Sheshach.”&lt;br /&gt;
See 2b for an Abash Cipher in action&lt;br /&gt;
&lt;br /&gt;
c. Julius Caesar's substitution cipher, 100 BC&lt;br /&gt;
&lt;br /&gt;
The Caesar shift cipher is another simply substitution cipher and was used for military communications. The cipher “shifts” the chosen letter left or right a set number based on the cipher key. So if there is a shift 2 to the right, then the letter A in plain text is shifted to C in the cipher text - it has “shifted” 2 letters to the right. &lt;br /&gt;
&lt;br /&gt;
Building a simple wheel coder/decoder is an easy way to use a Caesar cipher. It is fairly easy to break a Caesar cipher, either through brute force or (just keep replacing a letter in a word until the word makes sense) or through a frequency analysis of the coded message, recognizing that certain letters (E, T, S) are very common, and will occur more often than other letters. &lt;br /&gt;
&lt;br /&gt;
See question 6 for a Caesar Cipher in action. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a left +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our left +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You have plenty of choices for this one. &lt;br /&gt;
&lt;br /&gt;
Here is an example of using a columnar transposition cipher (with a key) to encode our message. In this form of cipher, we write our plain text in a grid horizontally, and write our cipher text by reading the columns vertically. But the twist is the key. Before writing our text, we write the key word across our grid. This determines how many rows we will have. The rows are then written as the cipher text based on the alphabetical order of the letters in the key word - so the first column isn't necessarily the first column we will write. If there are two of the same letter in the key word, the first appearance comes first in numbering the columns. &lt;br /&gt;
&lt;br /&gt;
So here is the way to encrypt using this method. Our plain text comes from the book of Psalm. Here we have converted the numbers to words so we do not need to worry about having numbers mixed with out letters. &lt;br /&gt;
&lt;br /&gt;
[[File:Plain Text Psalm to encode.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Our keyword is SHEPHARD. Yes, it is spelled like a person's name, not the job with sheep. Using similar sounding words can add to the complexity if someone overhears the key word. The keyword should be sent (or pre-arranged) separately from the cipher text. Perhaps you can use steganography to hide the key word. So, our key, shephard, has 8 letters, so we will have 8 columns in our grid. When we encode, we will begin with the column beneath the letter &amp;quot;A,&amp;quot; then the column beneath the letter &amp;quot;d,&amp;quot; then &amp;quot;e,&amp;quot; then the first &amp;quot;H,&amp;quot; then the second &amp;quot;H&amp;quot; and so on. So here is the verse written out in our grid.&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we write out the coded message, starting with the column under &amp;quot;a,&amp;quot; and so on. &lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we break it up (this time in groups of 5, but use whatever you want so long as it isnt the original number of columns)&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher text for psalm.png|frameless|center]]&lt;br /&gt;
&lt;br /&gt;
To decode, we would take the key word, make a grid, count the total number of characters in the encoded message and divide by the number of columns in our table to determine how many rows we need. Then we begin writing the cipher text vertically in the table, beginning with the &amp;quot;A&amp;quot; column and so on. Once complete, we read/write it out horizontally across the rows to recover our original text. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Raptors/Answer_Key&amp;diff=647326</id>
		<title>AY Honors/Raptors/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Raptors/Answer_Key&amp;diff=647326"/>
		<updated>2026-03-20T14:15:03Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. What does the word “raptor” mean? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:3--&amp;gt;&lt;br /&gt;
The word Raptor comes from the Latin word ''rapere'', meaning to seize, or snatch away. The term is used in reference with the way many raptors kill their prey with their feet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:4--&amp;gt;&lt;br /&gt;
Raptors include hawks, eagles, kites, vultures, condors, harriers, kestrels, falcons, owls and the secretarybird. Raptors are often referred to as birds of prey, as they are frequently active hunters (aside from the vultures and condors, which are primarily carrion eaters). A common characteristic among raptors are their sharp, curved talons for catching and holding prey, their curved upper bill for tearing flesh, and often their keen eyesight, hearing and/or sense of smell, used for finding their food.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Classification: --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:6--&amp;gt;&lt;br /&gt;
Raptors are divided into two broad groups, the diurnal raptors (those active in the day), such as hawks, eagles, kites, falcons and osprey, and the nocturnal raptors (those active at night), which comprise the typical owls and the barn owls.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}} &amp;lt;!--T:7--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:8--&amp;gt;&lt;br /&gt;
Raptors are currently divided into three Orders under the Class Aves: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:9--&amp;gt;&lt;br /&gt;
Order Accipitriformes (''accipiter'', from the Latin word meaning hawk)&lt;br /&gt;
* Family Accipitridae: including the hawks, eagles, and kites, represented by 74 genera and some 217 species worldwide&lt;br /&gt;
* Family Cathartidae (''cathartes'', from the Greek word meaning purifier): represented by five genera, and include the vultures and condors&lt;br /&gt;
* Family Pandionidae (''Pandion'', from the Greek legend, the father of Procne, changed into a swallow): the ingle species of Osprey&lt;br /&gt;
* Family Sagittariidae (''Sagittarius'', Latin for archer): One species of Secretarybird, found in Sub-Saharan Africa&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:10--&amp;gt;&lt;br /&gt;
Order Falconiformes (likely from ''falx'', from the Latin meaning sickle, referring to the curved beak)&lt;br /&gt;
* Family Falconidae: 11 Genera and some 60 species of falcons and their allies, including the Caracaras &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:11--&amp;gt;&lt;br /&gt;
Order Strigiformes (''strix'', from the Greek meaning to screech)&lt;br /&gt;
* Family Strigidae: 23 Genera and some 124 species of owls worldwide&lt;br /&gt;
* Family Tytonidae (''Tyto'', from the Greek for owl): Two genera and around ten species of Barn Owls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}} &amp;lt;!--T:12--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:13--&amp;gt;&lt;br /&gt;
Raptors are generally characterized by their sharp, curved talons, their sharp, powerful curved beaks, and their keen eyesight. The vultures (Cathartidae) do not have powerful talons, as they do not hunt live prey. The Turkey Vultures and the Yellow Headed Vultures have a very strong sense of smell, something that isn't as heightened in the Black Vulture, which finds its prey by sight - or by following the Turkey Vulture.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:14--&amp;gt;&lt;br /&gt;
'''Eyes''': Raptor eyes are very large for their head, and more forward pointing to allow binocular vision, which is important for determining distance to prey. Like many other birds, raptors are also able to see in the ultraviolet light spectrum, which may reveal the trails of potential rodent prey. Their overall vision is considered some eight times as powerful as a human, which is important as they fly far overhead, seeking small rodents and other prey. Diurnal raptors have good color vision, but nocturnal raptor eyes are instead designed to pick up every scrap of light, given their nighttime hunting habits. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:15--&amp;gt;&lt;br /&gt;
Protecting the eye is a bony ring, called the sclerotic ring, but while this helps keep the eye safe from injury, it also limits the raptor’s ability to turn its eyes, thus they turn their head to adjust where they are looking and ascertain distance to prey. To facilitate this manner of looking around, raptors have the ability to rotate their heads quite a bit, with some owls able to turn their heads more than 180 degrees around, looking completely backwards and then some. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:16--&amp;gt;&lt;br /&gt;
Another way raptors protect their eyes is with three eyelids, two outer ones that close up-and-down, and an inner translucent eyelid, called a nictitating membrane, which opens and closes fore-and-aft. The nictitating membrane may be closed while a raptor is digging its beak into its prey, to avoid getting things in its eyes, and the osprey is known to close the membrane before diving into water. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:17--&amp;gt;&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:Buteo_swainsoni_1.jpg|Sainson’s Hawk skull - note the large eye socket.&lt;br /&gt;
Image:Cathartes_aura_Skull.jpg|Turkey Vulture skull - note large nasal opening &lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:18--&amp;gt;&lt;br /&gt;
'''Talons/Feet''': With the exception of the vultures (Cathartidae), most raptors capture their live prey with their feet/talons. The feet are strong, and in diurnal raptors the lower legs are often bare (whereas many owls may have feathers even on their feet, with the Great Horned Owl having entirely feathered feet). The claws may be long and strongly curved, as in Osprey or falcons that catch fish or birds on the wing, or shorter for raptors hunting much larger prey. Most raptors have three toes facing forward and a fourth facing backwards, but owls and osprey can turn their small toe backwards, to have a two-two configuration, for better balance or grip.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:19--&amp;gt;&lt;br /&gt;
'''Beaks''': The common raptor beak shape is a sharp hook, designed to tear flesh, pull off feather and fur, and pierce flesh. Raptors do not chew their food, so they need to either swallow it whole, or tear it into bite sized pieces. Vultures, which eat carrion, may have slightly longer and straighter beaks, able to stick deeper into a carcass. Vultures also may have few or no feathers on their head, to avoid getting food in their feathers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:20--&amp;gt;&lt;br /&gt;
Many falcons, and some hawks and other accipiters, have a special extra projection on the outside edge of the upper mandible (beak) just behind the sharp curved tip. This is called the Tomial Tooth, and may be matched by a notch in the lower bill called the Tomial Notch. The falcons use this to quickly sever the spinal column of their small prey, quickly killing it.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}} &amp;lt;!--T:21--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:22--&amp;gt;&lt;br /&gt;
Use this to find how many of each family are in your area, and then see of you can find them. Some examples include: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:23--&amp;gt;&lt;br /&gt;
* Accipitridae: The largest and most diverse family of raptors. Includes the Bald Eagle, Red-Tailed Hawk, and Mississippi Kite, among others. Below are a small selection of raptors found in the Family Accipitridae.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:24--&amp;gt;&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:Accipiter cooperii 1.jpeg|Cooper’s Hawk (''Accipiter cooperii'')&lt;br /&gt;
Image:Buteo jamaicensis 3.jpg|Red-Tailed Hawk (''Buteo jamaicensis'')&lt;br /&gt;
Image:Terathopius ecaudatus 1.jpg|Bateleur Eagle (''Terathopius ecaudatus'')&lt;br /&gt;
Image:Parabuteo unicinctus 1.jpg|Harris’ Hawk (''Parabuteo unicinctus'')&lt;br /&gt;
Image:Haliaeetus leucocephalus 3.jpg|Bald Eagle (''Haliaeetus leucocephalus'')&lt;br /&gt;
Image:Spilornis cheela 1.jpg|Crested Serpent Eagle (''Spilornis cheela'')&lt;br /&gt;
Image:Haliastur indus 1.jpg|Brahminy Kite (''Haliastur indus'')&lt;br /&gt;
Image:Harpia harpyja 2.jpg|Harpy Eagle (''Harpia harpyja'')&lt;br /&gt;
Image:Buteo lineatus 6.jpg|Red-Shouldered Hawk (''Buteo lineatus'')&lt;br /&gt;
Image:Ictinia mississippiensis 1.jpg|Mississippi Kite (''Ictinia mississippiensis'')&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:25--&amp;gt;&lt;br /&gt;
* Cathartidae: There are seven recognized species in the Family Cathartidae: Turkey Vulture (Cathartes aura), Lesser Yellow-Headed Vulture (Cathartes burrovianus), Greater Yellow-Headed Vulture (Cathartes melambrotus), Black Vulture (Corygyps atratus), California Condor (Gymnogyps californianus), King Vulture (Sarcoramphus papa) and the massive Andean Condor (Vultur gryphus)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:26--&amp;gt;&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:Cathartes aura 7.jpg|Turkey Vulture (''Cathartes aura'')&lt;br /&gt;
Image:Coragyps atratus 3.jpg|Black Vulture (''Coragyps atratus'')&lt;br /&gt;
Image: Vultur gryphus 1.jpg|Andean Condor (''Vultur gryphus'')&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:27--&amp;gt;&lt;br /&gt;
* Pandionidae: There is one recognized species of Osprey:  (Pandion halietus)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:28--&amp;gt;&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:Pandion haliaetus 1.jpg|Western Osprey (''Pandion haliaetus'')&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:29--&amp;gt;&lt;br /&gt;
* Sagittariidae: There is only one species in this family, the Secretarybird (Sagittarius serpentarius), found in Africa.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:30--&amp;gt;&lt;br /&gt;
* Falconidae: Falconidae are divided into two sub-families, Falconinae and Polyborinae. The former has four genera, and includes the ubiquitous Peregrine Falcon (Falco peregrinus), the Merlin (Falco columbarius) and the American Kestrel (Falco sparvarius), as well as the tiny Black-Thighed Falconet (Microhierax fringillarius). The Polyborinae comprises seven genera, and includes the Crested Caracara (Caracara plancus) and the Barred Forest Falcon (Micrastur ruficollis).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:31--&amp;gt;&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:Falco peregrinus 1.jpg|Peregrine Falcon (''Falco peregrinus'')&lt;br /&gt;
Image:Caracara cheriway 1.jpg|Crested Caracara (''Caracara plancus'')&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:32--&amp;gt;&lt;br /&gt;
* Strigidae comprises 23 genera of “typical” owls in three sub-families, and includes the massive Eurasian Eagle-Owl (Bubo bubo), the Great Grey Owl (Strix nebulosa), the tiny Northern Pygmy Owl (Glaucidium gnoma) and the equally diminutive Elf Owl (Micrathene whitneyi), and the Great Horned Owl (Bubo virginianus).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:33--&amp;gt;&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:Bubo virginianus 2.jpg|Great Horned Owl (''Bubo virginianus'')&lt;br /&gt;
Image:Megascops asio 1.jpg|Eastern Screech Owl (''Megascops asio'')&lt;br /&gt;
Image:Pulsatrix perspicillata 1.jpg|Spectacled Owl (''Pulsatrix perspicillata'')&lt;br /&gt;
Image:Strix varia 1.jpg|Barred Owl (''Strix varia'')&lt;br /&gt;
Image:Ninox connivens 1.jpg|Barking Boobook (''Ninox connivens'')&lt;br /&gt;
Image:Bubo philippensis 1.jpg|Philippine Eagle-Owl (''Bubo philippensis'')&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:34--&amp;gt;&lt;br /&gt;
* Tytonidae is divided into two sub-families, each with just a single genus. Among the Tytonidae are the Oriental Bay Owl (Phodilus badius), the American Barn Owl (Tyto furcata), and the Australian Masked Owl (Tyto novaehollandiae).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:35--&amp;gt;&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:Tyto_alba_1.jpg|Barn Owl (''Tyto furcata'')&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:109--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. From a diagram, identify or label the following parts of the raptor: &amp;lt;br /&amp;gt;a. Eyes &amp;lt;br /&amp;gt;b. Feet &amp;amp; Talons &amp;lt;br /&amp;gt;c. Chest &amp;lt;br /&amp;gt;d. Body &amp;lt;br /&amp;gt;e. Beak &amp;lt;br /&amp;gt;f. Ears &amp;lt;br /&amp;gt;g. Wings &amp;lt;br /&amp;gt;h. Feathers --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:37--&amp;gt;&lt;br /&gt;
[[Image:ExternalAnatomy.jpg|300px]] &lt;br /&gt;
[[Image:FlightFeathers.jpg|300px]]&lt;br /&gt;
[[Image:OwlTalon 1.jpg|300px]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:38--&amp;gt;&lt;br /&gt;
The flight feathers in raptors (and all birds) are called Retrices on the tail, Remiges on the wings. The main feathers responsible for flight on the wings are divided into the Primary feathers (Primaries), the Secondary feathers (Secondaries), and at times Tertiary feathers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:39--&amp;gt;&lt;br /&gt;
The ears are usually hidden behind the feathers, and occur a little below and behind the eye. &amp;quot;Eared&amp;quot; owls, those with tufts sticking up on either side of the head, also have their ear in the normal place - the raised tufts are not related to the ear location.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:40--&amp;gt;&lt;br /&gt;
The third picture above is a close up shot of owl talons. Note the sharp, curved claws, used for grasping prey.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:110--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:111--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Discover the following information about raptors. Use this information to compare and contrast raptors with another family of birds, such as ducks &amp;amp; geese (anatidae) or parrots (psittaciform). --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:112--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:42--&amp;gt;&lt;br /&gt;
The smallest diurnal raptors are the Black-Thighed Falconet and the White-Fronted Falconet, the former, found on peninsular Malaysia and southern Thailand, Borneo, Sumatra and Java, measures 14-17 centimeters (5.5-6.7 inches) and weighs 28-55 grams (0.06-0.12 pounds). The latter is found in northern Borneo, also measuring 14-17 centimeters (5.5-6.7 inches), weighing 35-65 grams (0.08-0.14 pounds). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:43--&amp;gt;&lt;br /&gt;
The smallest diurnal raptor in the United States is the American Kestrel, which by comparison is a massive 22-31 centimeters (8.7-12.2 inches) long, and 80-165 grams (0.18-0.36 pounds). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:44--&amp;gt;&lt;br /&gt;
The smallest nocturnal raptor is a toss-up (depending upon the individual specimen) between the Northern Pygmy Owl (at 16-18 centimeters/6.3-7.1 inches long), found through Central America, Mexico, the western United States to Canada, and the Elf Owl, living in the American southwest and south central states and Mexico, at 13-30 centimeters (5.1-11.8 inches) long, and weighing around 40 grams (0.09 pounds). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:45--&amp;gt;&lt;br /&gt;
The Pygmy Parrots of New Guinea are the smallest parrots, measuring just 3.5-4 inches in length. The African Pygmy Goose, weighing in at just around six-tenths of a pound and measuring 12 inches in length, is the smallest of the waterfowl.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:113--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4a --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4b}} &amp;lt;!--T:46--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:114--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:47--&amp;gt;&lt;br /&gt;
The largest diurnal raptor by wingspan is the Andean Condor (image below), measuring in at 10 feet or more across. By weight, it is the California Condor, at 31 pounds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:48--&amp;gt;&lt;br /&gt;
[[Image:Vultur gryphus 2.jpg|300px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:49--&amp;gt;&lt;br /&gt;
The largest nocturnal raptor by weight is either the Eurasian Eagle-Owl, measuring 2-2.5 feet with a wingspan of 5-6 feet (weighing 3-9 pounds), or the endangered Blakiston’s Fish Owl, measuring 2-2.3 feet and weighing 6.5-10 pounds. By size (but not weight), the Great Grey Owl tops both, measuring 2-2.75 feet with a wingspan of up to five feet, but weighing in at only 1.3 to slightly over 4 pounds. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:50--&amp;gt;&lt;br /&gt;
By comparison, the largest parrots, the Hyacinth Macaw, can reach a length of some 3.3 feet, and the flightless Kakapo can weigh up to 4.5 pounds, and the largest waterfowl are the Trumpeter Swan, with a 10 foot wingspan and weighing in at some 38 pounds.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:115--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4b --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4c}} &amp;lt;!--T:51--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:116--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:52--&amp;gt;&lt;br /&gt;
As would be expected from such a diverse group, raptors build many different types of nests. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:53--&amp;gt;&lt;br /&gt;
Some build large stick nests, among them the Bald Eagles, Osprey, Secretarybird, Crested Caracara, and Red-Shouldered Hawk. Osprey nests are usually atop a solitary pole, Caracara may place their nests atop a small tree or palm. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:54--&amp;gt;&lt;br /&gt;
Others scrape out nesting sites on cliffs, such as the Peregrine Falcon, or the Merlin (which may also use old nests of other raptors).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:55--&amp;gt;&lt;br /&gt;
Several types of owls nest in natural cavities in trees, including the Screech Owl, while the Elf Owl prefers to nest in old woodpecker holes in Cacti. The Common Kestrel is another cavity nester.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:56--&amp;gt;&lt;br /&gt;
Most vultures do not bother building nests at all, laying their eggs in tall grasses, natural hollows in rocks or on cliffs, or in fallen hollow logs. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:57--&amp;gt;&lt;br /&gt;
The Burrowing Owl, as its name suggests, prefers to nest in ground burrows, usually ones abandoned by mammals. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:58--&amp;gt;&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:Pandion haliaetus 2.jpg|Osprey stick nest atop a pole&lt;br /&gt;
Image:Buteo lineatus 4.jpg|Red-Shouldered Hawk nest in the crook of a sycamore tree, two eyas (chicks) and mother in nest&lt;br /&gt;
Image:Bubo virginianus 2.jpg|Great Horned Owl nest atop a wall, with three owlets&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:117--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4c --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4d}} &amp;lt;!--T:59--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:118--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:60--&amp;gt;&lt;br /&gt;
Among the raptors, a general rule is that the smaller the species, the shorter the lifespan. Small raptors live 3-15 years, though for nearly all raptors, the first 1-3 years are the most dangerous, and the time they are most likely to be killed prematurely. Larger raptors live 20-40 years, and perhaps even longer in captivity for some species. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:61--&amp;gt;&lt;br /&gt;
Like the raptors, smaller parrots have shorter lifespans, perhaps some 15-20 years, while the larger species may live 80 or more years. For waterfowl, some geese may live well over 20 years, while other ducks may have shorter average lifespans, in the 8-20 year range.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:119--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4d --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4e}} &amp;lt;!--T:62--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:120--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:63--&amp;gt;&lt;br /&gt;
With the exception of the vultures (Cathartidae) which are carrion-eating scavengers, most raptors are active hunters, using their keen eyesight (watch them flying, and you will often see their head cocked to one side looking down) to find prey, and their sharp talons to capture the prey. Most falcons (Falconidae), as well as some Kites and other Accipiters, have a well developed extra &amp;quot;bump&amp;quot; on the outer edge of their upper mandible (beak) just behind the curved tip. This is referred to as the Tomial &amp;quot;tooth,&amp;quot; and is thought to assist the falcons in quickly killing their captured prey by severing the spinal column.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:64--&amp;gt;&lt;br /&gt;
The vultures are primarily carrion eaters, feeding on dead animals and the occasional invertebrate, lizard or amphibian or at times even small or young mammals. The Lesser Yellow-Headed Vulture prefers dead fish, the Turkey Vulture prefers smaller mammals, and the Black Vulture is known to eat just about anything dead.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:65--&amp;gt;&lt;br /&gt;
Secretarybirds hunt small mammals, reptiles, birds and invertebrates.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
Osprey are almost exclusively fish eaters, catching fish out of the water with their talons. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
Falcons feed on many different types of live prey, including live birds (the Peregrine Falcon is particularly adept at catching birds on the wing). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
Smaller hawks may prefer reptiles and amphibians and smaller mammals like rodents, larger hawks and eagles may tackle even bigger live prey, including rabbits and ducks. Smaller Accipiters and Falcons feed on insects.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
Owls are frequently known for their affinity for small mammals, particularly rodents. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
Bearded Vultures like to eat Ostrich eggs, among other things. Their beaks are not strong enough to pierce the thick shell, so they throw rocks at the eggs until they crack open. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
The Snail Kite, as its name implies, has a beak suited for prying snails out of their shells, and feeds mostly on apple snails. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:Buteo_lineatus_7.jpg|Red-Shouldered Hawk carrying a bird chick raided from another nest&lt;br /&gt;
Image:Accipiter_cooperii_2.jpg|A Cooper’s Hawk with a pigeon it killed&lt;br /&gt;
Image:Cathartes_aura_6.jpg|A Turkey Vulture preparing to enjoy a squirrel&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:121--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4e --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4f}} &amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:122--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
Raptors like hawks and eagles swallow their prey whole or if it can’t be swallowed whole they use their sharp beaks to pierce prey, pull of fur, tug away skin, pluck out feathers and tear meat into bite-sized, easy to swallow chunks. They also have a “tooth” tucked inside their upper beak. This “tooth” is shaped like a small triangle and is called a tomila. The tomila helps the raptor kill its prey quickly by cutting the prey’s spinal cord.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
Raptors like owls swallow their food whole if they can. The food goes directly from their mouth to their gizzard. They later regurgitate pellets of indigestible materials such as bone, fur and feathers. This is called a “pellet.” You can tell the diet of an owl by what is found in the pellet.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:123--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4f --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:124--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Do one of the following: --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:125--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
This can be done as part of Requirement #7. If going to a zoo or wildlife refuge be sure to plan the visit or prearrange for a demonstration of raptors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:126--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5a --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5b}} &amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:127--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
You can choose from this list or find another. Try your local library!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
*First Sight: Birds of Prey by Kate Petty, Shooting Star Press, 1995&lt;br /&gt;
*Birds of Prey, ZooBooks&lt;br /&gt;
*Eagles, ZooBooks&lt;br /&gt;
*Birds of the World, Eyewitness Handbook, DK Publishing 1993&lt;br /&gt;
*Birds of Prey Coloring book by John Green&lt;br /&gt;
*Birds of Prey from Falcons to Vultures by Sara Swan Miller, Franklin Watts, 2001&lt;br /&gt;
*Vultures by Sandra Markle, Lerner Publications Company 2005&lt;br /&gt;
*Birds of Prey: A look at Daytime Raptors by Sneed B Collard III, Grolier Publishing 1999&lt;br /&gt;
*Extreme Birds by Dominic Couzens, Firefly Books 2008&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:128--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5b --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5c}} &amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:129--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
Here is one possibility:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
{{#widget:YouTube|id=RNGHTrHul1Q}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:130--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5c --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;Requirement 6&amp;quot; &amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:131--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Do two of the following: --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:132--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
See the [[AY Honors/Puppetry|Puppetry]] honor for tips on doing this.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:133--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6a --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6b}} &amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:134--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
[http://kidwings.com/nests-of-knowledge/virtual-pellet/ This site] features an online owl pellet dissection app. You can also order actual owl pellets online and dissect them. Most pellet suppliers also offer toolkits for this.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:135--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6b --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6c}} &amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:136--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6c --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:137--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6d --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:138--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6e --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:139--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6f --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:140--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
This can be done while visiting a zoo under Requirement #7 or while working on some of the activities of this honor.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:141--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;!--Close requirement 6 anchor --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:142--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Experience raptors in one of the following ways --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:143--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
A docent is a person, often a volunteer, that provides information and tours. &lt;br /&gt;
{{AY Honors/Zoo Visit}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:144--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7a --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7b}} &amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:145--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:146--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7b --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:147--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Observe raptors in the wild nesting or migrating. If possible, work with an area nature center, park, or Wildlife Management Areas. --&amp;gt;&lt;br /&gt;
The [http://www.audubon.org National Audubon Society] is one possible resource for this. They run hundreds of nature centers and are usually located in an area frequented by many species of birds. Many such nature centers are located near urban areas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
Raptors live outside of Audubon Society nature centers as well. Many cities have thriving populations of raptors. The trick is to ''get outside'', keep your eyes open, spend time looking, and recognize them when they appear.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
While looking for raptors, you could work on the [[AY Honors/Birds|Birds]] honor at the same time.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:148--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:149--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Find two Bible passages about raptors and summarize a moral lesson from each one. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
There are many mentions of raptors in the Bible. Practice using a concordance in your search (something you need to do for Explorer class Investiture Achievement). Depending upon the version, there may be different translated names, but in general you will be able to find eagle, owl, falcon, kite, osprey, and vulture.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
Eagles generally denote speed, power, strength and might, as well as something largely unreachable and untamable. &lt;br /&gt;
* God's salvation is represented as a powerful eagle, protecting his people or carrying them out of trouble (Ex. 19:4, Deut. 32:11, Rev. 12:14, Ezek. 17:1-10)&lt;br /&gt;
* The eagle may be a symbol of strength, youth and revival (Ps. 103:5, Is. 40:28-31)&lt;br /&gt;
* Just as the eagle can be seen as powerful for good, it can also represent the power of destruction, often as either a tool of God’s wrath, or as a the power of an overwhelming enemy (Deut. 28:49, Jer. 4:13, Jer. 48:40, Jer. 49:22, Lam. 4:19, Hos. 8:1, Hab. 1:8)&lt;br /&gt;
* Eagles are fast, and are used as a comparison to speed, or to things being snatched away or fleeting (2 Sam. 1:23, Job 9:26, Prov. 23:5)&lt;br /&gt;
* The soaring height of eagles and their nests hidden in high rocky crags represents distance - a distance that is easily overcome by God (Jer. 49:16, Ob. 1:4)&lt;br /&gt;
* Finally, eagles are often seen in the characteristics of heavenly beings (Ez. 1:10, Dan. 7:4, Rev. 4:7, Rev. 8:13 - some versions use eagle, others angel)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
* Owls represent something that lives in desolate places, in places without people. They are a symbol of complete destruction, or of severe loneliness (Job 30:29 - some versions use ostriches, Ps. 102:6, Is. 13:21, Is. 14:23 - some versions replace owl with porcupine, Is. 34:8-15, Jer. 50:39 - some versions use ostrich, Zeph. 2:14 - some versions translate as different birds)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
There are other examples of raptors in the Bible, sometimes just as themselves (as in the discussions of clean and unclean animals in Leviticus and Deuteronomy), at other times based on their characteristics (falcons with strong sight, vultures gathering around a corpse).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:150--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=622100</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=622100"/>
		<updated>2025-07-07T00:14:05Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:ICS-flags.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. It is created (and solved) using an algorithm. A simple classic cipher, for example, is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). The algorithm could be written as (P)+X=(C), where &amp;quot;P&amp;quot; means the plain text letter, and &amp;quot;C&amp;quot; means the new cipher text letter, and &amp;quot;X&amp;quot; is the number of spaces to shift the letter. A 3 shift Caesar cipher, as below, adds 23 places (26 letters in the alphabet -3 shifted spaces) to get us our encoding, but we &amp;quot;subtract&amp;quot; three letters from the encoded message to solve for the original.   &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
Ciphers can be even more complex (and often are, particularly when using machines and computers). The Enigma machine of World War II used several mechanical elements to encode via a polyalphabetic cipher, meaning that in the enciphered text, a single letter may have different unencrypted meanings, based on where it was and how the algorithm encoded it.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file, subtly changing fonts, or using invisible ink. &lt;br /&gt;
&lt;br /&gt;
A simple two-part invisible ink can be created with things you likely already have in your house. The ink is made from a mixture of 1TBSP Baking Soda mixed in 1/2C water. Write the message with this ink on the paper. When first trying it out, use cotton swabs, but later you can experiment with finer brushes. Once the message is written, allow the paper to dry. &lt;br /&gt;
&lt;br /&gt;
[[File:Ink1.jpg|frame|center|Making the Invisible Ink]]&lt;br /&gt;
[[File:Ink2.jpg|frame|center|Write the message and allow to dry]]&lt;br /&gt;
&lt;br /&gt;
To reveal the invisible message, mix 1tsp turmeric with 1/2c rubbing alcohol to make the reagent. Then paint the reagent over the paper. Be careful, as it is easy to stain your fingers and the table a lovely yellow. &lt;br /&gt;
&lt;br /&gt;
[[File:Ink3.jpg|frame|center|Mix the reagent.]]&lt;br /&gt;
[[File:Ink4.jpg|frame|center|Use the reagent to reveal the message]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unencrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message. In a Caesar cipher, it is the number of letters to shift.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography, and is a way of transmitting secure messages via the internet/email, where even if intercepted the message cannot be decrypted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. If someone breaks into the database, they can only recover the hash value, which obscures the original information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
a. Processing done by a computer to determine if a user enters a correct password&lt;br /&gt;
&lt;br /&gt;
Cipher (a mathematical formula), using one-way encryption or a hash&lt;br /&gt;
&lt;br /&gt;
b. A Bible verse reference&lt;br /&gt;
&lt;br /&gt;
Plain text (just an abbreviation)&lt;br /&gt;
&lt;br /&gt;
c. The colors used on a traffic light to mean &amp;quot;Stop,&amp;quot; &amp;quot;Go,&amp;quot; or &amp;quot;Caution&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Code (each color having a different word meaning)&lt;br /&gt;
&lt;br /&gt;
d. HTTPS:// used in a URL over the Internet&lt;br /&gt;
&lt;br /&gt;
Cipher to security transfer data between two points&lt;br /&gt;
&lt;br /&gt;
e. Forming a message by entering it into a grid row-by-row and reading it out column-by-column&lt;br /&gt;
&lt;br /&gt;
Cipher (specifically a square cipher)&lt;br /&gt;
&lt;br /&gt;
f. Invisible ink&lt;br /&gt;
&lt;br /&gt;
Steganography (hiding a message in plain sight)&lt;br /&gt;
&lt;br /&gt;
g. Navajo language used by the Code Talkers in World War II&lt;br /&gt;
&lt;br /&gt;
Code (replacing words with words)&lt;br /&gt;
&lt;br /&gt;
h. Data representation via a grid of dots (QR codes) or lines (Bar codes)&lt;br /&gt;
&lt;br /&gt;
Code, though could also be used to hide additional information as a form of steganography&lt;br /&gt;
&lt;br /&gt;
i. Enigma machine used in World War II&lt;br /&gt;
&lt;br /&gt;
Cipher - used mathematical algorithms to encode and decode messages&lt;br /&gt;
&lt;br /&gt;
j. Recording your computer password on a piece of paper&lt;br /&gt;
&lt;br /&gt;
Plain Text (no encoding)&lt;br /&gt;
&lt;br /&gt;
k. Signal used by Jonathan and David recounted in 1 Samuel 20:18-23&lt;br /&gt;
&lt;br /&gt;
Code (each message coupled with arrow shot encoded its particular message)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
a. Egyptian hieroglyphs, 1900 BC&lt;br /&gt;
&lt;br /&gt;
[[File:Hieroglyphs from Stela of Ity.jpg|frame|A selection of hieroglyphs from the Stela of Ity, on display at the British Museum]]&lt;br /&gt;
[[File:Selection from Stela of Semty Junior.jpg|frame|Hieroglyphs from the stela of Semty Junior, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Egyptian hieroglyphs are not really a code or a cipher, they are a form of written language. Hieroglyphs are symbols that may be phonograms (represent a sound), Ideograms (represent a word), or determinatives (provide context for the other hieroglyphs in a message). There are three types of phonograms - unilaterals (the symbol represents a single sound), bilaterals (representing a double sound, such as “pr”), and trilaterals (representing three sounds combined, such as “mwt”). &lt;br /&gt;
&lt;br /&gt;
Hieroglyph words could be written right to left, left to right, top to bottom, and at times a bit of horizontal and vertical combined, depending upon how we. It fit within the physical context (thus the writing often was as much art as communication). Vowels were generally excluded (most common transliterations just toss an “e” between each consonant), and the exact pronunciation remains somewhat uncertain. Writing your name or some other message, then, may include first stripping out the vowels before encoding into hieroglyphs. You will often see people’s names enclosed in an oval, making them easier to spot. Hieroglyphs could be carved, painted, or both. &lt;br /&gt;
&lt;br /&gt;
[[File:The Rosetta Stone.jpg|frame|The Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4336.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4341.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
Although there were many attempts to translate hieroglyphs for centuries, the discovery of the Rosetta Stone in 1799 by the French provided the impetus for the final work to crack the “code.” The Rosetta Stone, carved around 196 BC, had the same message written in hieroglyphs (the priestly language), demotic (a more common form of written Egyptian), and ancient Greek (as Egypt had earlier been conquered by Alexander the Great). Using the Rosetta Stone as a guide, French scholar Jean-François Champollion became the first to be recognized for deciphering hieroglyphs in 1822. &lt;br /&gt;
&lt;br /&gt;
Many scholars and historians of cryptology date the earliest written cipher to the tomb of Khnumhotep II, an overseer during the Middle Kingdom period of Egypt (around 1900 BC). In the tomb, located in Beni Hassan, Egypt, there are several non-standard hieroglyphs, which may have been meant to highlight key words or phrases, or make the writings appear more significant. While not necessarily meant to hide the meaning, this is often considered a first use of a substitution cipher - replacing one letter or word with another. &lt;br /&gt;
&lt;br /&gt;
If you want to learn more to try and do your own hieroglyphic writing, there are several good books and online resources, including: &lt;br /&gt;
https://www.egyptianhieroglyphs.net/&lt;br /&gt;
https://www.bibalex.org/learnhieroglyphs/Lesson/Introduction_En.aspx&lt;br /&gt;
Or try an online “translator,” such as https://lingojam.com/HieroglyphicsTranslator&lt;br /&gt;
Or try out https://artsandculture.google.com/experiment/fabricius/gwHX41Sm0N7-Dw?hl=en&lt;br /&gt;
&lt;br /&gt;
b. Hebrew Atbash cipher, 500 BC&lt;br /&gt;
&lt;br /&gt;
The Abash cipher is a simple substitution cipher, reversing the order of the alphabet (the name is actually the first two and last two letters of the Hebrew alphabet). Hebrew has 22 letters, and using this cipher you replace the first with last, the second with second to last, etc. If we were to use the English alphabet (26 letters), A=Z, B=Y, C=X, D=W and so on. It is a simple cipher, making it useful but easy to crack.&lt;br /&gt;
&lt;br /&gt;
It is believed that there is a use of the Abash cipher in the book of Jeremiah. In Jeremiah 25:26 and 51:41, there is a mention of “Sheshach,” written right to left using the letters shin shin kaf. If an Abash cipher is applied, these would be replaced by bet bet lamed, the Hebrew word for Babel (or Babylon). Thus it is believed that here Jeremiah is referring to Babylon, not some unknown city or country of “Sheshach.”&lt;br /&gt;
See 2b for an Abash Cipher in action&lt;br /&gt;
&lt;br /&gt;
c. Julius Caesar's substitution cipher, 100 BC&lt;br /&gt;
&lt;br /&gt;
The Caesar shift cipher is another simply substitution cipher and was used for military communications. The cipher “shifts” the chosen letter left or right a set number based on the cipher key. So if there is a shift 2 to the right, then the letter A in plain text is shifted to C in the cipher text - it has “shifted” 2 letters to the right. &lt;br /&gt;
&lt;br /&gt;
Building a simple wheel coder/decoder is an easy way to use a Caesar cipher. It is fairly easy to break a Caesar cipher, either through brute force or (just keep replacing a letter in a word until the word makes sense) or through a frequency analysis of the coded message, recognizing that certain letters (E, T, S) are very common, and will occur more often than other letters. &lt;br /&gt;
&lt;br /&gt;
See question 6 for a Caesar Cipher in action. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a left +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our left +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You have plenty of choices for this one. &lt;br /&gt;
&lt;br /&gt;
Here is an example of using a columnar transposition cipher (with a key) to encode our message. In this form of cipher, we write our plain text in a grid horizontally, and write our cipher text by reading the columns vertically. But the twist is the key. Before writing our text, we write the key word across our grid. This determines how many rows we will have. The rows are then written as the cipher text based on the alphabetical order of the letters in the key word - so the first column isn't necessarily the first column we will write. If there are two of the same letter in the key word, the first appearance comes first in numbering the columns. &lt;br /&gt;
&lt;br /&gt;
So here is the way to encrypt using this method. Our plain text comes from the book of Psalm. Here we have converted the numbers to words so we do not need to worry about having numbers mixed with out letters. &lt;br /&gt;
&lt;br /&gt;
[[File:Plain Text Psalm to encode.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Our keyword is SHEPHARD. Yes, it is spelled like a person's name, not the job with sheep. Using similar sounding words can add to the complexity if someone overhears the key word. The keyword should be sent (or pre-arranged) separately from the cipher text. Perhaps you can use steganography to hide the key word. So, our key, shephard, has 8 letters, so we will have 8 columns in our grid. When we encode, we will begin with the column beneath the letter &amp;quot;A,&amp;quot; then the column beneath the letter &amp;quot;d,&amp;quot; then &amp;quot;e,&amp;quot; then the first &amp;quot;H,&amp;quot; then the second &amp;quot;H&amp;quot; and so on. So here is the verse written out in our grid.&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we write out the coded message, starting with the column under &amp;quot;a,&amp;quot; and so on. &lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we break it up (this time in groups of 5, but use whatever you want so long as it isnt the original number of columns)&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher text for psalm.png|frameless|center]]&lt;br /&gt;
&lt;br /&gt;
To decode, we would take the key word, make a grid, count the total number of characters in the encoded message and divide by the number of columns in our table to determine how many rows we need. Then we begin writing the cipher text vertically in the table, beginning with the &amp;quot;A&amp;quot; column and so on. Once complete, we read/write it out horizontally across the rows to recover our original text. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Ink4.jpg&amp;diff=622099</id>
		<title>File:Ink4.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Ink4.jpg&amp;diff=622099"/>
		<updated>2025-07-07T00:11:17Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;revealed invisible message&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Ink3.jpg&amp;diff=622098</id>
		<title>File:Ink3.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Ink3.jpg&amp;diff=622098"/>
		<updated>2025-07-07T00:10:29Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Invisible ink reagent&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Ink2.jpg&amp;diff=622097</id>
		<title>File:Ink2.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Ink2.jpg&amp;diff=622097"/>
		<updated>2025-07-07T00:08:26Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Writing with invisible ink&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Ink1.jpg&amp;diff=622096</id>
		<title>File:Ink1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Ink1.jpg&amp;diff=622096"/>
		<updated>2025-07-07T00:07:36Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Baking Soda and Water invisible ink&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=622095</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=622095"/>
		<updated>2025-07-05T03:29:50Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:ICS-flags.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. It is created (and solved) using an algorithm. A simple classic cipher, for example, is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). The algorithm could be written as (P)+X=(C), where &amp;quot;P&amp;quot; means the plain text letter, and &amp;quot;C&amp;quot; means the new cipher text letter, and &amp;quot;X&amp;quot; is the number of spaces to shift the letter. A 3 shift Caesar cipher, as below, adds 23 places (26 letters in the alphabet -3 shifted spaces) to get us our encoding, but we &amp;quot;subtract&amp;quot; three letters from the encoded message to solve for the original.   &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
Ciphers can be even more complex (and often are, particularly when using machines and computers). The Enigma machine of World War II used several mechanical elements to encode via a polyalphabetic cipher, meaning that in the enciphered text, a single letter may have different unencrypted meanings, based on where it was and how the algorithm encoded it.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file, subtly changing fonts, or using invisible ink. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unencrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message. In a Caesar cipher, it is the number of letters to shift.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography, and is a way of transmitting secure messages via the internet/email, where even if intercepted the message cannot be decrypted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. If someone breaks into the database, they can only recover the hash value, which obscures the original information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
a. Processing done by a computer to determine if a user enters a correct password&lt;br /&gt;
&lt;br /&gt;
Cipher (a mathematical formula), using one-way encryption or a hash&lt;br /&gt;
&lt;br /&gt;
b. A Bible verse reference&lt;br /&gt;
&lt;br /&gt;
Plain text (just an abbreviation)&lt;br /&gt;
&lt;br /&gt;
c. The colors used on a traffic light to mean &amp;quot;Stop,&amp;quot; &amp;quot;Go,&amp;quot; or &amp;quot;Caution&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Code (each color having a different word meaning)&lt;br /&gt;
&lt;br /&gt;
d. HTTPS:// used in a URL over the Internet&lt;br /&gt;
&lt;br /&gt;
Cipher to security transfer data between two points&lt;br /&gt;
&lt;br /&gt;
e. Forming a message by entering it into a grid row-by-row and reading it out column-by-column&lt;br /&gt;
&lt;br /&gt;
Cipher (specifically a square cipher)&lt;br /&gt;
&lt;br /&gt;
f. Invisible ink&lt;br /&gt;
&lt;br /&gt;
Steganography (hiding a message in plain sight)&lt;br /&gt;
&lt;br /&gt;
g. Navajo language used by the Code Talkers in World War II&lt;br /&gt;
&lt;br /&gt;
Code (replacing words with words)&lt;br /&gt;
&lt;br /&gt;
h. Data representation via a grid of dots (QR codes) or lines (Bar codes)&lt;br /&gt;
&lt;br /&gt;
Code, though could also be used to hide additional information as a form of steganography&lt;br /&gt;
&lt;br /&gt;
i. Enigma machine used in World War II&lt;br /&gt;
&lt;br /&gt;
Cipher - used mathematical algorithms to encode and decode messages&lt;br /&gt;
&lt;br /&gt;
j. Recording your computer password on a piece of paper&lt;br /&gt;
&lt;br /&gt;
Plain Text (no encoding)&lt;br /&gt;
&lt;br /&gt;
k. Signal used by Jonathan and David recounted in 1 Samuel 20:18-23&lt;br /&gt;
&lt;br /&gt;
Code (each message coupled with arrow shot encoded its particular message)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
a. Egyptian hieroglyphs, 1900 BC&lt;br /&gt;
&lt;br /&gt;
[[File:Hieroglyphs from Stela of Ity.jpg|frame|A selection of hieroglyphs from the Stela of Ity, on display at the British Museum]]&lt;br /&gt;
[[File:Selection from Stela of Semty Junior.jpg|frame|Hieroglyphs from the stela of Semty Junior, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Egyptian hieroglyphs are not really a code or a cipher, they are a form of written language. Hieroglyphs are symbols that may be phonograms (represent a sound), Ideograms (represent a word), or determinatives (provide context for the other hieroglyphs in a message). There are three types of phonograms - unilaterals (the symbol represents a single sound), bilaterals (representing a double sound, such as “pr”), and trilaterals (representing three sounds combined, such as “mwt”). &lt;br /&gt;
&lt;br /&gt;
Hieroglyph words could be written right to left, left to right, top to bottom, and at times a bit of horizontal and vertical combined, depending upon how we. It fit within the physical context (thus the writing often was as much art as communication). Vowels were generally excluded (most common transliterations just toss an “e” between each consonant), and the exact pronunciation remains somewhat uncertain. Writing your name or some other message, then, may include first stripping out the vowels before encoding into hieroglyphs. You will often see people’s names enclosed in an oval, making them easier to spot. Hieroglyphs could be carved, painted, or both. &lt;br /&gt;
&lt;br /&gt;
[[File:The Rosetta Stone.jpg|frame|The Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4336.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4341.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
Although there were many attempts to translate hieroglyphs for centuries, the discovery of the Rosetta Stone in 1799 by the French provided the impetus for the final work to crack the “code.” The Rosetta Stone, carved around 196 BC, had the same message written in hieroglyphs (the priestly language), demotic (a more common form of written Egyptian), and ancient Greek (as Egypt had earlier been conquered by Alexander the Great). Using the Rosetta Stone as a guide, French scholar Jean-François Champollion became the first to be recognized for deciphering hieroglyphs in 1822. &lt;br /&gt;
&lt;br /&gt;
Many scholars and historians of cryptology date the earliest written cipher to the tomb of Khnumhotep II, an overseer during the Middle Kingdom period of Egypt (around 1900 BC). In the tomb, located in Beni Hassan, Egypt, there are several non-standard hieroglyphs, which may have been meant to highlight key words or phrases, or make the writings appear more significant. While not necessarily meant to hide the meaning, this is often considered a first use of a substitution cipher - replacing one letter or word with another. &lt;br /&gt;
&lt;br /&gt;
If you want to learn more to try and do your own hieroglyphic writing, there are several good books and online resources, including: &lt;br /&gt;
https://www.egyptianhieroglyphs.net/&lt;br /&gt;
https://www.bibalex.org/learnhieroglyphs/Lesson/Introduction_En.aspx&lt;br /&gt;
Or try an online “translator,” such as https://lingojam.com/HieroglyphicsTranslator&lt;br /&gt;
Or try out https://artsandculture.google.com/experiment/fabricius/gwHX41Sm0N7-Dw?hl=en&lt;br /&gt;
&lt;br /&gt;
b. Hebrew Atbash cipher, 500 BC&lt;br /&gt;
&lt;br /&gt;
The Abash cipher is a simple substitution cipher, reversing the order of the alphabet (the name is actually the first two and last two letters of the Hebrew alphabet). Hebrew has 22 letters, and using this cipher you replace the first with last, the second with second to last, etc. If we were to use the English alphabet (26 letters), A=Z, B=Y, C=X, D=W and so on. It is a simple cipher, making it useful but easy to crack.&lt;br /&gt;
&lt;br /&gt;
It is believed that there is a use of the Abash cipher in the book of Jeremiah. In Jeremiah 25:26 and 51:41, there is a mention of “Sheshach,” written right to left using the letters shin shin kaf. If an Abash cipher is applied, these would be replaced by bet bet lamed, the Hebrew word for Babel (or Babylon). Thus it is believed that here Jeremiah is referring to Babylon, not some unknown city or country of “Sheshach.”&lt;br /&gt;
See 2b for an Abash Cipher in action&lt;br /&gt;
&lt;br /&gt;
c. Julius Caesar's substitution cipher, 100 BC&lt;br /&gt;
&lt;br /&gt;
The Caesar shift cipher is another simply substitution cipher and was used for military communications. The cipher “shifts” the chosen letter left or right a set number based on the cipher key. So if there is a shift 2 to the right, then the letter A in plain text is shifted to C in the cipher text - it has “shifted” 2 letters to the right. &lt;br /&gt;
&lt;br /&gt;
Building a simple wheel coder/decoder is an easy way to use a Caesar cipher. It is fairly easy to break a Caesar cipher, either through brute force or (just keep replacing a letter in a word until the word makes sense) or through a frequency analysis of the coded message, recognizing that certain letters (E, T, S) are very common, and will occur more often than other letters. &lt;br /&gt;
&lt;br /&gt;
See question 6 for a Caesar Cipher in action. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a left +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our left +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You have plenty of choices for this one. &lt;br /&gt;
&lt;br /&gt;
Here is an example of using a columnar transposition cipher (with a key) to encode our message. In this form of cipher, we write our plain text in a grid horizontally, and write our cipher text by reading the columns vertically. But the twist is the key. Before writing our text, we write the key word across our grid. This determines how many rows we will have. The rows are then written as the cipher text based on the alphabetical order of the letters in the key word - so the first column isn't necessarily the first column we will write. If there are two of the same letter in the key word, the first appearance comes first in numbering the columns. &lt;br /&gt;
&lt;br /&gt;
So here is the way to encrypt using this method. Our plain text comes from the book of Psalm. Here we have converted the numbers to words so we do not need to worry about having numbers mixed with out letters. &lt;br /&gt;
&lt;br /&gt;
[[File:Plain Text Psalm to encode.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Our keyword is SHEPHARD. Yes, it is spelled like a person's name, not the job with sheep. Using similar sounding words can add to the complexity if someone overhears the key word. The keyword should be sent (or pre-arranged) separately from the cipher text. Perhaps you can use steganography to hide the key word. So, our key, shephard, has 8 letters, so we will have 8 columns in our grid. When we encode, we will begin with the column beneath the letter &amp;quot;A,&amp;quot; then the column beneath the letter &amp;quot;d,&amp;quot; then &amp;quot;e,&amp;quot; then the first &amp;quot;H,&amp;quot; then the second &amp;quot;H&amp;quot; and so on. So here is the verse written out in our grid.&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we write out the coded message, starting with the column under &amp;quot;a,&amp;quot; and so on. &lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we break it up (this time in groups of 5, but use whatever you want so long as it isnt the original number of columns)&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher text for psalm.png|frameless|center]]&lt;br /&gt;
&lt;br /&gt;
To decode, we would take the key word, make a grid, count the total number of characters in the encoded message and divide by the number of columns in our table to determine how many rows we need. Then we begin writing the cipher text vertically in the table, beginning with the &amp;quot;A&amp;quot; column and so on. Once complete, we read/write it out horizontally across the rows to recover our original text. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=622094</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=622094"/>
		<updated>2025-07-05T03:18:33Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:ICS-flags.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. It is created (and solved) using an algorithm. A simple classic cipher, for example, is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). The algorithm could be written as (P)+X=(C), where &amp;quot;P&amp;quot; means the plain text letter, and &amp;quot;C&amp;quot; means the new cipher text letter, and &amp;quot;X&amp;quot; is the number of spaces to shift the letter. A 3 shift Caesar cipher, as below, adds 23 places (26 letters in the alphabet -3 shifted spaces) to get us our encoding, but we &amp;quot;subtract&amp;quot; three letters from the encoded message to solve for the original.   &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
Ciphers can be even more complex (and often are, particularly when using machines and computers). The Enigma machine of World War II used several mechanical elements to encode via a polyalphabetic cipher, meaning that in the enciphered text, a single letter may have different unencrypted meanings, based on where it was and how the algorithm encoded it.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file, subtly changing fonts, or using invisible ink. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unencrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message. In a Caesar cipher, it is the number of letters to shift.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography, and is a way of transmitting secure messages via the internet/email, where even if intercepted the message cannot be decrypted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. If someone breaks into the database, they can only recover the hash value, which obscures the original information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
a. Egyptian hieroglyphs, 1900 BC&lt;br /&gt;
&lt;br /&gt;
[[File:Hieroglyphs from Stela of Ity.jpg|frame|A selection of hieroglyphs from the Stela of Ity, on display at the British Museum]]&lt;br /&gt;
[[File:Selection from Stela of Semty Junior.jpg|frame|Hieroglyphs from the stela of Semty Junior, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
Egyptian hieroglyphs are not really a code or a cipher, they are a form of written language. Hieroglyphs are symbols that may be phonograms (represent a sound), Ideograms (represent a word), or determinatives (provide context for the other hieroglyphs in a message). There are three types of phonograms - unilaterals (the symbol represents a single sound), bilaterals (representing a double sound, such as “pr”), and trilaterals (representing three sounds combined, such as “mwt”). &lt;br /&gt;
&lt;br /&gt;
Hieroglyph words could be written right to left, left to right, top to bottom, and at times a bit of horizontal and vertical combined, depending upon how we. It fit within the physical context (thus the writing often was as much art as communication). Vowels were generally excluded (most common transliterations just toss an “e” between each consonant), and the exact pronunciation remains somewhat uncertain. Writing your name or some other message, then, may include first stripping out the vowels before encoding into hieroglyphs. You will often see people’s names enclosed in an oval, making them easier to spot. Hieroglyphs could be carved, painted, or both. &lt;br /&gt;
&lt;br /&gt;
[[File:The Rosetta Stone.jpg|frame|The Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4336.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
[[File:Rosetta 4341.jpg|frame|A selection from the Rosetta Stone, on display at the British Museum]]&lt;br /&gt;
&lt;br /&gt;
Although there were many attempts to translate hieroglyphs for centuries, the discovery of the Rosetta Stone in 1799 by the French provided the impetus for the final work to crack the “code.” The Rosetta Stone, carved around 196 BC, had the same message written in hieroglyphs (the priestly language), demotic (a more common form of written Egyptian), and ancient Greek (as Egypt had earlier been conquered by Alexander the Great). Using the Rosetta Stone as a guide, French scholar Jean-François Champollion became the first to be recognized for deciphering hieroglyphs in 1822. &lt;br /&gt;
&lt;br /&gt;
Many scholars and historians of cryptology date the earliest written cipher to the tomb of Khnumhotep II, an overseer during the Middle Kingdom period of Egypt (around 1900 BC). In the tomb, located in Beni Hassan, Egypt, there are several non-standard hieroglyphs, which may have been meant to highlight key words or phrases, or make the writings appear more significant. While not necessarily meant to hide the meaning, this is often considered a first use of a substitution cipher - replacing one letter or word with another. &lt;br /&gt;
&lt;br /&gt;
If you want to learn more to try and do your own hieroglyphic writing, there are several good books and online resources, including: &lt;br /&gt;
https://www.egyptianhieroglyphs.net/&lt;br /&gt;
https://www.bibalex.org/learnhieroglyphs/Lesson/Introduction_En.aspx&lt;br /&gt;
Or try an online “translator,” such as https://lingojam.com/HieroglyphicsTranslator&lt;br /&gt;
Or try out https://artsandculture.google.com/experiment/fabricius/gwHX41Sm0N7-Dw?hl=en&lt;br /&gt;
&lt;br /&gt;
b. Hebrew Atbash cipher, 500 BC&lt;br /&gt;
&lt;br /&gt;
The Abash cipher is a simple substitution cipher, reversing the order of the alphabet (the name is actually the first two and last two letters of the Hebrew alphabet). Hebrew has 22 letters, and using this cipher you replace the first with last, the second with second to last, etc. If we were to use the English alphabet (26 letters), A=Z, B=Y, C=X, D=W and so on. It is a simple cipher, making it useful but easy to crack.&lt;br /&gt;
&lt;br /&gt;
It is believed that there is a use of the Abash cipher in the book of Jeremiah. In Jeremiah 25:26 and 51:41, there is a mention of “Sheshach,” written right to left using the letters shin shin kaf. If an Abash cipher is applied, these would be replaced by bet bet lamed, the Hebrew word for Babel (or Babylon). Thus it is believed that here Jeremiah is referring to Babylon, not some unknown city or country of “Sheshach.”&lt;br /&gt;
See 2b for an Abash Cipher in action&lt;br /&gt;
&lt;br /&gt;
c. Julius Caesar's substitution cipher, 100 BC&lt;br /&gt;
&lt;br /&gt;
The Caesar shift cipher is another simply substitution cipher and was used for military communications. The cipher “shifts” the chosen letter left or right a set number based on the cipher key. So if there is a shift 2 to the right, then the letter A in plain text is shifted to C in the cipher text - it has “shifted” 2 letters to the right. &lt;br /&gt;
&lt;br /&gt;
Building a simple wheel coder/decoder is an easy way to use a Caesar cipher. It is fairly easy to break a Caesar cipher, either through brute force or (just keep replacing a letter in a word until the word makes sense) or through a frequency analysis of the coded message, recognizing that certain letters (E, T, S) are very common, and will occur more often than other letters. &lt;br /&gt;
&lt;br /&gt;
See question 6 for a Caesar Cipher in action. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a left +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our left +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You have plenty of choices for this one. &lt;br /&gt;
&lt;br /&gt;
Here is an example of using a columnar transposition cipher (with a key) to encode our message. In this form of cipher, we write our plain text in a grid horizontally, and write our cipher text by reading the columns vertically. But the twist is the key. Before writing our text, we write the key word across our grid. This determines how many rows we will have. The rows are then written as the cipher text based on the alphabetical order of the letters in the key word - so the first column isn't necessarily the first column we will write. If there are two of the same letter in the key word, the first appearance comes first in numbering the columns. &lt;br /&gt;
&lt;br /&gt;
So here is the way to encrypt using this method. Our plain text comes from the book of Psalm. Here we have converted the numbers to words so we do not need to worry about having numbers mixed with out letters. &lt;br /&gt;
&lt;br /&gt;
[[File:Plain Text Psalm to encode.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Our keyword is SHEPHARD. Yes, it is spelled like a person's name, not the job with sheep. Using similar sounding words can add to the complexity if someone overhears the key word. The keyword should be sent (or pre-arranged) separately from the cipher text. Perhaps you can use steganography to hide the key word. So, our key, shephard, has 8 letters, so we will have 8 columns in our grid. When we encode, we will begin with the column beneath the letter &amp;quot;A,&amp;quot; then the column beneath the letter &amp;quot;d,&amp;quot; then &amp;quot;e,&amp;quot; then the first &amp;quot;H,&amp;quot; then the second &amp;quot;H&amp;quot; and so on. So here is the verse written out in our grid.&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we write out the coded message, starting with the column under &amp;quot;a,&amp;quot; and so on. &lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we break it up (this time in groups of 5, but use whatever you want so long as it isnt the original number of columns)&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher text for psalm.png|frameless|center]]&lt;br /&gt;
&lt;br /&gt;
To decode, we would take the key word, make a grid, count the total number of characters in the encoded message and divide by the number of columns in our table to determine how many rows we need. Then we begin writing the cipher text vertically in the table, beginning with the &amp;quot;A&amp;quot; column and so on. Once complete, we read/write it out horizontally across the rows to recover our original text. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Rosetta_4341.jpg&amp;diff=622093</id>
		<title>File:Rosetta 4341.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Rosetta_4341.jpg&amp;diff=622093"/>
		<updated>2025-07-05T03:17:05Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A selection from the Rosetta Stone, on display at the British Museum&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Rosetta_4336.jpg&amp;diff=622092</id>
		<title>File:Rosetta 4336.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Rosetta_4336.jpg&amp;diff=622092"/>
		<updated>2025-07-05T03:15:27Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A close up of a selection of the Rosetta Stone&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:The_Rosetta_Stone.jpg&amp;diff=622091</id>
		<title>File:The Rosetta Stone.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:The_Rosetta_Stone.jpg&amp;diff=622091"/>
		<updated>2025-07-05T03:14:16Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Rosetta Stone, on display at the British Museum&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Selection_from_Stela_of_Semty_Junior.jpg&amp;diff=622090</id>
		<title>File:Selection from Stela of Semty Junior.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Selection_from_Stela_of_Semty_Junior.jpg&amp;diff=622090"/>
		<updated>2025-07-05T03:12:09Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A selection of hieroglyphs from the Stela of Semty Junior&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Hieroglyphs_from_Stela_of_Ity.jpg&amp;diff=622089</id>
		<title>File:Hieroglyphs from Stela of Ity.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Hieroglyphs_from_Stela_of_Ity.jpg&amp;diff=622089"/>
		<updated>2025-07-05T03:08:26Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A selection from the Stela of Ity, on display at the British Museum&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=622088</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=622088"/>
		<updated>2025-07-05T03:00:34Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:ICS-flags.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. It is created (and solved) using an algorithm. A simple classic cipher, for example, is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). The algorithm could be written as (P)+X=(C), where &amp;quot;P&amp;quot; means the plain text letter, and &amp;quot;C&amp;quot; means the new cipher text letter, and &amp;quot;X&amp;quot; is the number of spaces to shift the letter. A 3 shift Caesar cipher, as below, adds 23 places (26 letters in the alphabet -3 shifted spaces) to get us our encoding, but we &amp;quot;subtract&amp;quot; three letters from the encoded message to solve for the original.   &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
Ciphers can be even more complex (and often are, particularly when using machines and computers). The Enigma machine of World War II used several mechanical elements to encode via a polyalphabetic cipher, meaning that in the enciphered text, a single letter may have different unencrypted meanings, based on where it was and how the algorithm encoded it.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file, subtly changing fonts, or using invisible ink. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unencrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message. In a Caesar cipher, it is the number of letters to shift.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography, and is a way of transmitting secure messages via the internet/email, where even if intercepted the message cannot be decrypted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. If someone breaks into the database, they can only recover the hash value, which obscures the original information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a left +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our left +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You have plenty of choices for this one. &lt;br /&gt;
&lt;br /&gt;
Here is an example of using a columnar transposition cipher (with a key) to encode our message. In this form of cipher, we write our plain text in a grid horizontally, and write our cipher text by reading the columns vertically. But the twist is the key. Before writing our text, we write the key word across our grid. This determines how many rows we will have. The rows are then written as the cipher text based on the alphabetical order of the letters in the key word - so the first column isn't necessarily the first column we will write. If there are two of the same letter in the key word, the first appearance comes first in numbering the columns. &lt;br /&gt;
&lt;br /&gt;
So here is the way to encrypt using this method. Our plain text comes from the book of Psalm. Here we have converted the numbers to words so we do not need to worry about having numbers mixed with out letters. &lt;br /&gt;
&lt;br /&gt;
[[File:Plain Text Psalm to encode.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Our keyword is SHEPHARD. Yes, it is spelled like a person's name, not the job with sheep. Using similar sounding words can add to the complexity if someone overhears the key word. The keyword should be sent (or pre-arranged) separately from the cipher text. Perhaps you can use steganography to hide the key word. So, our key, shephard, has 8 letters, so we will have 8 columns in our grid. When we encode, we will begin with the column beneath the letter &amp;quot;A,&amp;quot; then the column beneath the letter &amp;quot;d,&amp;quot; then &amp;quot;e,&amp;quot; then the first &amp;quot;H,&amp;quot; then the second &amp;quot;H&amp;quot; and so on. So here is the verse written out in our grid.&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we write out the coded message, starting with the column under &amp;quot;a,&amp;quot; and so on. &lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we break it up (this time in groups of 5, but use whatever you want so long as it isnt the original number of columns)&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher text for psalm.png|frameless|center]]&lt;br /&gt;
&lt;br /&gt;
To decode, we would take the key word, make a grid, count the total number of characters in the encoded message and divide by the number of columns in our table to determine how many rows we need. Then we begin writing the cipher text vertically in the table, beginning with the &amp;quot;A&amp;quot; column and so on. Once complete, we read/write it out horizontally across the rows to recover our original text. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621893</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621893"/>
		<updated>2025-06-11T13:42:40Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:ICS-flags.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. It is created (and solved) using an algorithm. A simple classic cipher, for example, is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). The algorithm could be written as (P)+X=(C), where &amp;quot;P&amp;quot; means the plain text letter, and &amp;quot;C&amp;quot; means the new cipher text letter, and &amp;quot;X&amp;quot; is the number of spaces to shift the letter. A 3 shift Caesar cipher, as below, adds 23 places (26 letters in the alphabet -3 shifted spaces) to get us our encoding, but we &amp;quot;subtract&amp;quot; three letters from the encoded message to solve for the original.   &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
Ciphers can be even more complex (and often are, particularly when using machines and computers). The Enigma machine of World War II used several mechanical elements to encode via a polyalphabetic cipher, meaning that in the enciphered text, a single letter may have different unencrypted meanings, based on where it was and how the algorithm encoded it.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file, subtly changing fonts, or using invisible ink. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unencrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message. In a Caesar cipher, it is the number of letters to shift.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography, and is a way of transmitting secure messages via the internet/email, where even if intercepted the message cannot be decrypted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. If someone breaks into the database, they can only recover the hash value, which obscures the original information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a right +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our right +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You have plenty of choices for this one. &lt;br /&gt;
&lt;br /&gt;
Here is an example of using a columnar transposition cipher (with a key) to encode our message. In this form of cipher, we write our plain text in a grid horizontally, and write our cipher text by reading the columns vertically. But the twist is the key. Before writing our text, we write the key word across our grid. This determines how many rows we will have. The rows are then written as the cipher text based on the alphabetical order of the letters in the key word - so the first column isn't necessarily the first column we will write. If there are two of the same letter in the key word, the first appearance comes first in numbering the columns. &lt;br /&gt;
&lt;br /&gt;
So here is the way to encrypt using this method. Our plain text comes from the book of Psalm. Here we have converted the numbers to words so we do not need to worry about having numbers mixed with out letters. &lt;br /&gt;
&lt;br /&gt;
[[File:Plain Text Psalm to encode.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Our keyword is SHEPHARD. Yes, it is spelled like a person's name, not the job with sheep. Using similar sounding words can add to the complexity if someone overhears the key word. The keyword should be sent (or pre-arranged) separately from the cipher text. Perhaps you can use steganography to hide the key word. So, our key, shephard, has 8 letters, so we will have 8 columns in our grid. When we encode, we will begin with the column beneath the letter &amp;quot;A,&amp;quot; then the column beneath the letter &amp;quot;d,&amp;quot; then &amp;quot;e,&amp;quot; then the first &amp;quot;H,&amp;quot; then the second &amp;quot;H&amp;quot; and so on. So here is the verse written out in our grid.&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we write out the coded message, starting with the column under &amp;quot;a,&amp;quot; and so on. &lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we break it up (this time in groups of 5, but use whatever you want so long as it isnt the original number of columns)&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher text for psalm.png|frameless|center]]&lt;br /&gt;
&lt;br /&gt;
To decode, we would take the key word, make a grid, count the total number of characters in the encoded message and divide by the number of columns in our table to determine how many rows we need. Then we begin writing the cipher text vertically in the table, beginning with the &amp;quot;A&amp;quot; column and so on. Once complete, we read/write it out horizontally across the rows to recover our original text. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621892</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621892"/>
		<updated>2025-06-10T22:38:19Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:ICS-flags.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. It is created (and solved) using an algorithm. A simple classic cipher, for example, is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). The algorithm could be written as (P)+X=(C), where &amp;quot;P&amp;quot; means the plain text letter, and &amp;quot;C&amp;quot; means the new cipher text letter, and &amp;quot;X&amp;quot; is the number of spaces to shift the letter. A 3 shift Caesar cipher, as below, adds 23 places (26 letters in the alphabet -3 shifted spaces) to get us our encoding, but we &amp;quot;subtract&amp;quot; three letters from the encoded message to solve for the original.   &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
Ciphers can be even more complex (and often are, particularly when using machines and computers). The Enigma machine of World War II used several mechanical elements to encode via a polyalphabetic cipher, meaning that in the enciphered text, a single letter may have different unencrypted meanings, based on where it was and how the algorithm encoded it.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file, subtly changing fonts, or using invisible ink. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unencrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message. In a Caesar cipher, it is the number of letters to shift.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography, and is a way of transmitting secure messages via the internet/email, where even if intercepted the message cannot be decrypted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. If someone breaks into the database, they can only recover the hash value, which obscures the original information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a right +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our right +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You have plenty of choices for this one. Here is an example of using a columnar transposition cipher (with a key) to encode our message. In this form of cipher, we write our plain text in a grid horizontally, and write our cipher text by reading the columns vertically. But the twist is the key. Before writing our text, we write the key word across our grid. This determines how many rows we will have. The rows are then written as the cipher text based on the alphabetical order of the letters in the key word - so the first column isn't necessarily the first column we will write. If there are two of the same letter in the key word, the first appearance comes first in numbering the columns. &lt;br /&gt;
&lt;br /&gt;
So here is the way to encrypt using this method. Our plain text comes from the book of Psalm. Here we have converted the numbers to words so we do not need to worry about having numbers mixed with out letters. &lt;br /&gt;
&lt;br /&gt;
[[File:Plain Text Psalm to encode.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Our keyword is SHEPHARD. It has 8 letters, so we will have 8 columns in our grid. When we encode, we will begin with the column beneath the letter &amp;quot;A,&amp;quot; then the column beneath the letter &amp;quot;d,&amp;quot; then &amp;quot;e,&amp;quot; then the first &amp;quot;H,&amp;quot; then the second &amp;quot;H&amp;quot; and so on. So here is the verse written out in our grid.&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we write out the coded message, starting with the column under &amp;quot;a,&amp;quot; and so on. &lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Psalm.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we break it up (this time in groups of 5, but use whatever you want so long as it isnt the original number of columns)&lt;br /&gt;
&lt;br /&gt;
[[File:Cipher text for psalm.png|frameless|center]]&lt;br /&gt;
&lt;br /&gt;
To decode, we would take the key word, make a grid, count the total number of characters in the encoded message and divide by the number of columns in our table to determine how many rows we need. Then we begin writing the cipher text vertically in the table, beginning with the &amp;quot;A&amp;quot; column and so on. Once complete, we read/write it out horizontally across the rows to recover our original text. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Cipher_text_for_psalm.png&amp;diff=621891</id>
		<title>File:Cipher text for psalm.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Cipher_text_for_psalm.png&amp;diff=621891"/>
		<updated>2025-06-10T22:36:24Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;our final cipher text for our psalm encryptian&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Encoding_a_Psalm.png&amp;diff=621890</id>
		<title>File:Encoding a Psalm.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Encoding_a_Psalm.png&amp;diff=621890"/>
		<updated>2025-06-10T22:35:10Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;the cipher text for encoding a psalm&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Cipher_psalm.png&amp;diff=621889</id>
		<title>File:Cipher psalm.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Cipher_psalm.png&amp;diff=621889"/>
		<updated>2025-06-10T22:33:53Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;a grid showing how to encode a part of a psalm using a columnar transposition cipher with the key word shephard&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Plain_Text_Psalm_to_encode.png&amp;diff=621888</id>
		<title>File:Plain Text Psalm to encode.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Plain_Text_Psalm_to_encode.png&amp;diff=621888"/>
		<updated>2025-06-10T22:32:25Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;a plain text file of Psalm 19:1-2 for encrypting&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621664</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621664"/>
		<updated>2025-06-08T14:11:25Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:ICS-flags.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. It is created (and solved) using an algorithm. A simple classic cipher, for example, is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). The algorithm could be written as (P)+X=(C), where &amp;quot;P&amp;quot; means the plain text letter, and &amp;quot;C&amp;quot; means the new cipher text letter, and &amp;quot;X&amp;quot; is the number of spaces to shift the letter. A 3 shift Caesar cipher, as below, adds 23 places (26 letters in the alphabet -3 shifted spaces) to get us our encoding, but we &amp;quot;subtract&amp;quot; three letters from the encoded message to solve for the original.   &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
Ciphers can be even more complex (and often are, particularly when using machines and computers). The Enigma machine of World War II used several mechanical elements to encode via a polyalphabetic cipher, meaning that in the enciphered text, a single letter may have different unencrypted meanings, based on where it was and how the algorithm encoded it.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file, subtly changing fonts, or using invisible ink. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unencrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message. In a Caesar cipher, it is the number of letters to shift.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography, and is a way of transmitting secure messages via the internet/email, where even if intercepted the message cannot be decrypted. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. If someone breaks into the database, they can only recover the hash value, which obscures the original information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a right +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our right +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621663</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621663"/>
		<updated>2025-06-08T13:54:38Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Codes use symbols to replace the original message. These may include images, numbers, colors, etc. In many codes, the entire word can be represented by a symbol or another word. &lt;br /&gt;
&lt;br /&gt;
For example, if we see a traffic light, each color represents a word or phrase, with a specific meaning: red=stop, amber=caution, green=go. The color denotes a word, and is thus a code. At sea, ships may use flags and pennants as part of the International Code of Signals, each flag representing a letter, number, word, or phrase. &lt;br /&gt;
&lt;br /&gt;
[[File:Https://en.wikipedia.org/wiki/International Code of Signals|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
In wartime and in secret government communications, code words may be used to obfuscate the actual meaning. During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. A simple classic cipher is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unecrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a right +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our right +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621662</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621662"/>
		<updated>2025-06-08T13:45:03Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a code, words or phrases are encrypted (as opposed to individual letters). During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. A simple classic cipher is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unecrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Caesar cipher is a relatively simple cipher, with the coded text just shifting the letter a certain number of spaces left or right along the alphabet. If we have 26 letters in the alphabet, it means we can shift the alphabet 25 different ways right and 25 different ways left. A &amp;quot;right +2&amp;quot; Caesar cipher would move each letter two spaces to the right, so &amp;quot;A&amp;quot; would be encoded as &amp;quot;C,&amp;quot; &amp;quot;B&amp;quot; would be &amp;quot;D&amp;quot; and so on, until &amp;quot;Y&amp;quot; wrapped around to &amp;quot;A&amp;quot; and &amp;quot;Z&amp;quot; wrapped around to be encoded as &amp;quot;B.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is a right +12 Caesar cipher (12 for the number of disciples). You can use a code phrase or some other way to signify the shift (though Caesar ciphers are relatively simple to break using brute force approaches and basic logic of language). &lt;br /&gt;
&lt;br /&gt;
[[File:Plus 12 Caesar Cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To use this, we first lay out our plain text&lt;br /&gt;
&lt;br /&gt;
[[File:Plain text of Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we encode the letters using our right +12 Caesar cipher&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding the Pathfinder Law.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we remove our plain text, and can send the encoded text instead.&lt;br /&gt;
&lt;br /&gt;
[[File:The Pathfinder Law encoded.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:The_Pathfinder_Law_encoded.png&amp;diff=621661</id>
		<title>File:The Pathfinder Law encoded.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:The_Pathfinder_Law_encoded.png&amp;diff=621661"/>
		<updated>2025-06-08T13:44:49Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;the Pathfinder Law encoded using a right +12 Caesar cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Encoding_the_Pathfinder_Law.png&amp;diff=621660</id>
		<title>File:Encoding the Pathfinder Law.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Encoding_the_Pathfinder_Law.png&amp;diff=621660"/>
		<updated>2025-06-08T13:43:34Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Showing how to encode the Pathfinder Law using a right +12 Caesar cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Plain_text_of_Pathfinder_Law.png&amp;diff=621659</id>
		<title>File:Plain text of Pathfinder Law.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Plain_text_of_Pathfinder_Law.png&amp;diff=621659"/>
		<updated>2025-06-08T13:42:24Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;the Pathfinder Law in a monospaced font, in preparation for encryptian&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Plus_12_Caesar_Cipher.png&amp;diff=621658</id>
		<title>File:Plus 12 Caesar Cipher.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Plus_12_Caesar_Cipher.png&amp;diff=621658"/>
		<updated>2025-06-08T13:40:33Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;an example of a right 12 caesae cipher, as well as a set of numbers to think about any Caesar cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621657</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621657"/>
		<updated>2025-06-08T11:25:54Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a code, words or phrases are encrypted (as opposed to individual letters). During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. A simple classic cipher is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unecrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. &lt;br /&gt;
&lt;br /&gt;
But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand. Steganography is hiding a message in plain sight. One simple way to do this is to write the message in invisible ink, such as lemon juice. When the ink dries, it cannot be seen on the paper until treated (with lemon juice, that means exposing it to heat). If you write the message over an already printed paper, it is even more hidden, as those intercepting the message will think the plain text is the message when in fact the real message is hidden underneath and waits to be revealed. &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621656</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621656"/>
		<updated>2025-06-08T01:27:47Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a code, words or phrases are encrypted (as opposed to individual letters). During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. A simple classic cipher is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unecrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. Morse Code can be considered a substitution cipher, as each letter is replaced with a unique set of dashes and dots, which allowed the message to be sent across telegraph lines by sending longer (dash) or shorter (dot) pulses of electricity.&lt;br /&gt;
&lt;br /&gt;
[[File:International Morse Code.svg|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand.   &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621655</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621655"/>
		<updated>2025-06-08T01:23:40Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a code, words or phrases are encrypted (as opposed to individual letters). During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. A simple classic cipher is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unecrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. Changing a file by saving it somewhere else, or in a different format, however, may compromise the message. Information can also be hidden in video files, music files, and other digital media. But one doesn't always need a computer to hide messages in plain sight. This has been done for centuries, by hand.   &lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621654</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621654"/>
		<updated>2025-06-08T01:15:24Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a code, words or phrases are encrypted (as opposed to individual letters). During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. A simple classic cipher is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unecrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are many online tools to embed messages in images using ‘least significant bit’ (LSB) steganography, which changes one character in the encoding of the colors for pixels. This is nearly invisible to the human eye, but can be decoded by machine. This image of the Pathfinder Logo looks like the original, but has the Pathfinder Pledge hidden within - something that ca be read by a LSB stenography decoder. &lt;br /&gt;
&lt;br /&gt;
[[File:PathfinderLogoHiddenText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For a time-consuming but clever text based steganography, we can use Bacon's cipher to encode the Pathfinder Pledge. Bacon's cipher first replaces each letter with a five-letter a-b key (similar to binary, but using a and b rather than 0 and 1). Then, the message is written by using a different font or other clue for each a or b mapped against a piece of concealment text. It doesn't matter what the text is, so long as when it is written, one can break it into blocks of five letters, and see which letter represents an a or a b. Those five character a-b blocks then remap against the original cipher, revealing the original text. &lt;br /&gt;
&lt;br /&gt;
[[File:BaconsCipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using Bacon's cipher, we can convert the Pathfinder Pledge to the following string of five-character a-b blocks. So we converted By (the first word of the pledge) into aaaab babba, and continue with the whole Pledge, ignoring spaces and punctuation.&lt;br /&gt;
&lt;br /&gt;
[[File:EncryptedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we need our concealment text. The encrypted text is 485 characters long, so we need at least that much text. For this exercise, we have a selection from The Pathfinder Story, which, with its citation, is exactly 485 characters. We will hide the a-b encrypted text within this concealment text. &lt;br /&gt;
&lt;br /&gt;
[[File:ConcealmentText.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Now we take our concealment text, remove all of the punctuation and spaces, and break it into five character blocks, so we can map it against the cipher. &lt;br /&gt;
&lt;br /&gt;
[[File:ContractedConcealment.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
We can then map this set of five character text blocks against our cipher text so we know what characters to slightly alter to encode our message in plain sight. &lt;br /&gt;
&lt;br /&gt;
[[File:Mapped.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
For this version, we then take all of the letters that map against an &amp;quot;a&amp;quot; in the cipher text and leave them as 14 point font, while all the letters that map against a &amp;quot;b&amp;quot; in the cipher text are converted to 13 point font. It is a little noticeable, but not immediately obvious in the text that we have a hidden code. &lt;br /&gt;
&lt;br /&gt;
[[File:EncodedMessage.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To make it easier to see, here is some of the text with the 13 point font letters in red. We would not send it this way, but this may help you see how the encoding works in the concealment message. &lt;br /&gt;
&lt;br /&gt;
[[File:ShowEncoding.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To decrypt, we reverse the process. We first break our text into five character blocks, so we will be able to write out the cifer text. Here, we are using red to showcase which characters were in the 13 point font, while we leave the 14 point font characters in black. &lt;br /&gt;
&lt;br /&gt;
[[File:FiveBlock.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Next, we convert the coded concealment text into a-b blocks. In this case, red (13 point font) letters are converted to &amp;quot;b,&amp;quot; black (14 point font) characters are converted to &amp;quot;a.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[File:Fiveblockdecrypt.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Finally, we take the cipher text (the a-b blocks) and convert them to letters, giving us our hidden message. &lt;br /&gt;
&lt;br /&gt;
[[File:Decrypted.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The clever thing about Bacon's cipher, despite the long process, is that done right, it is almost impossible to tell that there is even a hidden message. By hiding the message in plain sight, others are less likely to think it is a message, and thus wont even work to break the cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Decrypted.png&amp;diff=621653</id>
		<title>File:Decrypted.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Decrypted.png&amp;diff=621653"/>
		<updated>2025-06-08T01:13:58Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;shocasing how to decrypt a Bacon's cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Fiveblockdecrypt.png&amp;diff=621652</id>
		<title>File:Fiveblockdecrypt.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Fiveblockdecrypt.png&amp;diff=621652"/>
		<updated>2025-06-08T01:12:52Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Anotehr step in decrypting a message sent in Bacon's cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:FiveBlock.png&amp;diff=621651</id>
		<title>File:FiveBlock.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:FiveBlock.png&amp;diff=621651"/>
		<updated>2025-06-08T01:10:15Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;showing a step in decoding steganography and Bacon's cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:ShowEncoding.png&amp;diff=621650</id>
		<title>File:ShowEncoding.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:ShowEncoding.png&amp;diff=621650"/>
		<updated>2025-06-08T01:08:24Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Revealing the point size encoding in a sample of text steganography&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:EncodedMessage.png&amp;diff=621649</id>
		<title>File:EncodedMessage.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:EncodedMessage.png&amp;diff=621649"/>
		<updated>2025-06-08T01:06:51Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An encoded message using different font sizes to demonstrate steganography&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Mapped.png&amp;diff=621648</id>
		<title>File:Mapped.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Mapped.png&amp;diff=621648"/>
		<updated>2025-06-08T01:04:31Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A concealment text mapped against a cipher text&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:ContractedConcealment.png&amp;diff=621647</id>
		<title>File:ContractedConcealment.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:ContractedConcealment.png&amp;diff=621647"/>
		<updated>2025-06-08T01:03:12Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A selection of text broken into five character blocks to map against Bacon's cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:ConcealmentText.png&amp;diff=621646</id>
		<title>File:ConcealmentText.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:ConcealmentText.png&amp;diff=621646"/>
		<updated>2025-06-08T01:01:26Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A selection from The Pathfinder Story, to be used as concealment text for an example of steganography using Bacon's cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:EncryptedMessage.png&amp;diff=621645</id>
		<title>File:EncryptedMessage.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:EncryptedMessage.png&amp;diff=621645"/>
		<updated>2025-06-08T00:59:03Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Pathfinder Pledge written in Bacon's cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:BaconsCipher.png&amp;diff=621644</id>
		<title>File:BaconsCipher.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:BaconsCipher.png&amp;diff=621644"/>
		<updated>2025-06-08T00:55:30Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;an example of a 24 character Bacon's Cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:PathfinderLogoHiddenText.png&amp;diff=621643</id>
		<title>File:PathfinderLogoHiddenText.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:PathfinderLogoHiddenText.png&amp;diff=621643"/>
		<updated>2025-06-08T00:51:04Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Pathfinder Pledge hidden via LSB steganography in the Pathfinder logo&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621642</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621642"/>
		<updated>2025-06-07T03:20:30Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a code, words or phrases are encrypted (as opposed to individual letters). During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. A simple classic cipher is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unecrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
One well known polyalphabetic cipher is the Vigenere cipher, which uses a full alphabet grid (see below). &lt;br /&gt;
&lt;br /&gt;
[[File:Vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
The message is encoded using a key phrase. The key phrase, repeated as necessary, is aligned above the unencoded text message, and each encoded replacement letter is found by the intersection of the key phrase letter column and the unencoded text letter row. In this case, we will use the key phrase &amp;quot;Sixth grade&amp;quot; and encode the message &amp;quot;Companion Class&amp;quot;. We would align these atop one another, for example &lt;br /&gt;
&lt;br /&gt;
[[File:A code phrase .png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
To encode, we find the letter at the intersection of S and C, which is U. The next letter is encoded by finding the intersection of I and O, which is W. Once done, our message is encoded as UWJIHTCOQGDIPL&lt;br /&gt;
&lt;br /&gt;
[[File:Encoding a Vigenere.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
[[File:Using the vigenere cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Encoding_a_Vigenere.png&amp;diff=621641</id>
		<title>File:Encoding a Vigenere.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Encoding_a_Vigenere.png&amp;diff=621641"/>
		<updated>2025-06-07T03:20:00Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;sample encoding using a Vigenere&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Using_the_vigenere_cipher.png&amp;diff=621640</id>
		<title>File:Using the vigenere cipher.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Using_the_vigenere_cipher.png&amp;diff=621640"/>
		<updated>2025-06-07T03:17:02Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;part of a solution for encoding using a vigenere cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:A_code_phrase_.png&amp;diff=621639</id>
		<title>File:A code phrase .png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:A_code_phrase_.png&amp;diff=621639"/>
		<updated>2025-06-07T03:13:15Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;a code phrase for a vigenere cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=File:Vigenere_cipher.png&amp;diff=621638</id>
		<title>File:Vigenere cipher.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=File:Vigenere_cipher.png&amp;diff=621638"/>
		<updated>2025-06-07T03:09:14Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A vigenere cipher&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621637</id>
		<title>AY Honors/Cryptography/Answer Key</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=AY_Honors/Cryptography/Answer_Key&amp;diff=621637"/>
		<updated>2025-06-07T02:30:09Z</updated>

		<summary type="html">&lt;p&gt;RABaker96: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{HonorSubpage}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;section begin=&amp;quot;Body&amp;quot; /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:66--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1. Define cryptography and list its major applications. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cryptography is the science or process of encoding and decoding messages to allow more secure transfer of information. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:67--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:68--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2. Define the following terms: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:69--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:70--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a code, words or phrases are encrypted (as opposed to individual letters). During World War II, for example, the U.S. Navy used code words to represent locations or activities, so if the message was intercepted, the enemy would not know what or where they were talking about. &lt;br /&gt;
&lt;br /&gt;
For example, the word &amp;quot;BALSA&amp;quot; in a message meant &amp;quot;Midway Island,&amp;quot; &amp;quot;WOODBANK&amp;quot; meant &amp;quot;Paris, France,&amp;quot; and &amp;quot;RANCID&amp;quot; translated to &amp;quot;Greenland.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:71--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:72--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Cipher encrypts a message at the level of individual or small groups of letters, rather than replacing entire words. A simple classic cipher is the Caesar cipher, where the alphabet is shifted a certain number of spaces to encode and decode the message. The example below is a Caesar cipher with a key of 3 (ie each letter is shifted 3 places). &lt;br /&gt;
&lt;br /&gt;
[[File:A 3 key Caesar cipher.png|frame|center]]&lt;br /&gt;
 &lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Ranger&amp;quot; as OXKDBO, the word &amp;quot;Voyager&amp;quot; as SLVXDBO &lt;br /&gt;
&lt;br /&gt;
Another simple classic cipher is the Atbash cipher, where the code is the alphabet in reverse. &lt;br /&gt;
&lt;br /&gt;
[[File:Atbash cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using this cipher, we could encode the word &amp;quot;Companion&amp;quot; as xlnkzmrlm, the word &amp;quot;Guide&amp;quot; as tfrwv&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:73--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:74--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Steganography is the process of hiding data/information inside other data, for example hiding textual information in an image file&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:75--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:76--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Plain Text refers to the unecrypted information prior to encoding&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:77--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:78--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A key is the information necessary to encrypt and decrypt a particular message&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:79--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2e --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:80--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A public key is part of a two-key encryption/decryption model, where one key is private, and another is publicly available. Public Key Cryptography is also called Asymmetric Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:81--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2f --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:82--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A one way function is a model of encrypting information where it is relatively easy to convert the data one way, but much more difficult to reverse the process. In some computer applications, this one way function results in a hash value, allowing secure storage of sensitive information or passwords. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:83--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2g --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:84--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:85--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:86--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Transposition is a classic cipher that moves the position of letters in a word or phrase, rather than replacing them. At its simplest, this could involve just shifting things around (Hello Friend might be encoded as Olleh Dneirf). Other forms include a rail fence ciphers as shown below, which write the words in a zig-zag pattern and then encode across the rows.  &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 2 lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A two-line rail fence cipher, to encode &amp;quot;Pathfinders Strong.&amp;quot; Once entered into the blocks, we would then send the encoded message as &amp;quot;PTFNESTOGAHIDRSRN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[File:Rail Fence Cipher - 3 Lines.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
A three-line rail fence cipher, to encode &amp;quot;pathfinders strong.&amp;quot; Once entered into the blocks, we would send the encoded message as &amp;quot;pfetgahidrsrntnso&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:87--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3a --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:88--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A traditional Polybius Square is a 5X5 grid with the alphabet filling in the square (English alphabet needs a larger square, or combines two letters, such as I and J or U and V of C and K). Each square is then given a 2 digit code as per its column and row number. &lt;br /&gt;
&lt;br /&gt;
[[File:Polybius Square.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
Using the square above, we would encode the word &amp;quot;Pathfinder&amp;quot; as: &amp;quot;53 11 44 32 12 42 33 41 51 24&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:89--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3b --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:90--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a square cipher, the letters are placed in a grid, and encoded against another grid. A common square grid is a four square grid, made up (as the name implies) of four 5X5 grids. The upper left and lower right are a regular alphabet, the upper right and lower left may have a code word (in this case Pathfinder Strong is the code word - the code word is written in the squares first, then the grid is finished with the rest of the alphabet). &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
To encode a message, it is first broken into two-letter segments. So pathfinder becomes pa th fi nd er (if there were an odd number of letters, you would use an x to fill the final pair). The first letter of the pair is found in the upper left grid, the second of the pair in the lower right. To encode, move along the row from the first letter to pair up with the column of the second letter. Then for the second letter, move along its row to align with the column of the first letter. &lt;br /&gt;
&lt;br /&gt;
[[File:Four square cipher - coded for Pathfinder.png|frame|center]]&lt;br /&gt;
&lt;br /&gt;
In the image here, we have also color coded to see. So PA = BN, TH = QC, FI = EG, ND = KR, ER = AU. We would then send the encoded message (Pathfinder) as BNQCEGKRAU&lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:91--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3c --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:92--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A substitution cipher is a simple cipher, where each letter/number is replaced by an alternate letter/number/symbol. The characters are changed for the encoded message, but not the order of characters. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:93--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3d --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:94--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In a polyalphabetic cipher, the substituted letter is determined both by the key and the placement in a word. So it may be that every third letter, the cipher shifts, or there is a different cipher for first letter, second letter, third letter, etc. In this style, the encoded message letters may represent different letters in the unencoded message, as different ciphers are used for different positions. It is more complicated to decode than a simple substitution cipher. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:95--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3e --&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 3 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:96--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:97--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 4 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:98--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:99--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 5 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:100--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:101--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 6 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:102--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 7. Use steganography to write the Pathfinder Pledge. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:103--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 7 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:104--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:105--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 8 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;!--T:106--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- 9. Decrypt a message made by another person using the key and cipher type they used. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--T:107--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
{{CloseReq}} &amp;lt;!-- 9 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
==References== &amp;lt;!--T:108--&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&amp;lt;/translate&amp;gt;&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]&lt;br /&gt;
&lt;br /&gt;
{{CloseHonorPage}}&lt;/div&gt;</summary>
		<author><name>RABaker96</name></author>
	</entry>
</feed>