Difference between revisions of "AY Honors/Cryptography/Answer Key"

From Pathfinder Wiki
< AY Honors‎ | CryptographyAY Honors/Cryptography/Answer Key
m
(19 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<languages /><br />
+
{{HonorSubpage}}
<noinclude><translate></noinclude>
+
<section begin="Body" />
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}
 +
<noinclude><translate><!--T:22-->
 +
</noinclude>
 +
<!-- 1. What does the word Cryptography mean? What is the difference between Steganography and Cryptography? -->
 +
 
 +
<!--T:23-->
 +
Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential.
 +
 
 +
<!--T:24-->
 +
When the message is encoded, only those who have been given the key or code book will know how to decode the secret message.
 +
 
 +
<!--T:25-->
 +
Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it.
 +
 
 +
<!--T:26-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 1 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}
 +
<noinclude><translate><!--T:27-->
 +
</noinclude>
 +
<!-- 2. Know the meaning of the following terms: -->
 +
 
 +
<!--T:28-->
 +
<noinclude></translate></noinclude>
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}} <!--T:5-->
 +
<noinclude><translate><!--T:29-->
 +
</noinclude>
 +
 
 +
<!--T:30-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 2a -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}} <!--T:6-->
 +
<noinclude><translate><!--T:31-->
 +
</noinclude>
 +
 
 +
<!--T:32-->
 +
Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text).
 +
 
 +
<!--T:33-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 2b -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}} <!--T:7-->
 +
<noinclude><translate><!--T:34-->
 +
</noinclude>
 +
 
 +
<!--T:35-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 2c -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}} <!--T:8-->
 +
<noinclude><translate><!--T:36-->
 +
</noinclude>
 +
 
 +
<!--T:37-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 2d -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}} <!--T:9-->
 +
<noinclude><translate><!--T:38-->
 +
</noinclude>
  
{{honor_desc
+
<!--T:39-->
|stage=00
+
<noinclude></translate></noinclude>
|honorname=Cryptology
+
{{CloseReq}} <!-- 2e -->
|skill=2
+
{{CloseReq}} <!-- 2 -->
|year=2012
+
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}
|category=Vocational
+
<noinclude><translate><!--T:40-->
|authority=Southeast Asia Union
+
</noinclude>
|insignia=Cryptology AY Honour.png}}
+
<!-- 3. What is the original meaning of the word “cipher?” -->
  
==1. What does the word Cryptography mean? What is the difference between Steganography and Cryptography?==
+
<!--T:41-->
 +
The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero."
  
==2. Know the meaning of the following terms:==
+
<!--T:42-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 3 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}
 +
<noinclude><translate><!--T:43-->
 +
</noinclude>
 +
<!-- 4. What is a scytale? Make a scytale to send a secret message. -->
  
===a. Encryption===
+
<!--T:44-->
 +
Scytale in Greek means a baton.
  
===b. Decryption===
+
<!--T:45-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 4 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}
 +
<noinclude><translate><!--T:46-->
 +
</noinclude>
 +
<!-- 5. What is the “Enigma” machine and how were the Enigma-coded messages finally decoded? -->
  
===c. Plain text===
+
<!--T:47-->
 +
The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I.
  
===d. Cipher text===
+
<!--T:48-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 5 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}
 +
<noinclude><translate><!--T:49-->
 +
</noinclude>
 +
<!-- 6. What is meant by the term “code talkers” and when was code talking first used? -->
  
===e. Cryptanalysis===
+
<!--T:50-->
 +
Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio.
  
==3. What is the original meaning of the word “cipher?”==
+
<!--T:51-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 6 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}
 +
<noinclude><translate><!--T:52-->
 +
</noinclude>
 +
<!-- 7. Why was the Navajo language particularly useful as a code during World War II? -->
  
==4. What is a scytale? Make a scytale to send a secret message.==
+
<!--T:53-->
 +
The Navajo language was an unpublished language and no books in Navajo had ever been published.  
  
==5. What is the “Enigma” machine and how was the Enigma coded messages finally decoded?==
+
<!--T:54-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 7 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}
 +
<noinclude><translate><!--T:55-->
 +
</noinclude>
 +
<!-- 8. What is the Rosetta Stone and why is the discovery of this stone so important? -->
  
==6. What is meant by the term “code talkers” and when was code talking first used?==
+
<!--T:56-->
 +
The decree by Ptolemy V written on the Rosetta Stone appears in three languages.
  
==7. Why was the Navajo language particularly useful as a code during World War II?==
+
<!--T:57-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 8 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}
 +
<noinclude><translate><!--T:58-->
 +
</noinclude>
 +
<!-- 9. Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings. -->
  
==8. What is the Rosetta Stone and why is the discovery of this stone so important?==
+
<!--T:59-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 9 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}}
 +
<noinclude><translate><!--T:60-->
 +
</noinclude>
 +
<!-- 10. Know what a transposition cipher is and how to encode and decode a message using it. -->
  
==9. Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings.==
+
<!--T:61-->
 +
A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text.
  
==10. Know what a transposition cipher is and how to encode and decode a message using it.==
+
<!--T:62-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 10 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}}
 +
<noinclude><translate><!--T:63-->
 +
</noinclude>
 +
<!-- 11. Know what a substitution cipher is and how to encode and decode a message using it. -->
  
==11. Know what a substitution cipher is and how to encode and decode a message using it.==
+
<!--T:64-->
 +
A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text.
  
==References==
+
<!--T:65-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 11 -->
 +
<noinclude><translate></noinclude>
 +
==References== <!--T:19-->
  
 +
<!--T:20-->
 
* [https://www.youtube.com/watch?v=BQUcIkr4N-U Cryptology Pathfinder Honour on YouTube (sponsored by the British Union)]
 
* [https://www.youtube.com/watch?v=BQUcIkr4N-U Cryptology Pathfinder Honour on YouTube (sponsored by the British Union)]
 +
* [https://youth.adventistchurch.org.uk/e-club-cryptography-honour PowerPoint and Answer Sheet]
 +
<noinclude></translate></noinclude>
  
[[Category:Adventist Youth Honors Answer Book|{{SUBPAGENAME}}]]
+
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]
<noinclude></translate></noinclude>
+
{{CloseHonorPage}}

Revision as of 14:25, 2 January 2023

Other languages:
English • ‎español • ‎français
Cryptography

Skill Level

1

Year

2025

Version

18.12.2025

Approval authority

North American Division

Cryptography AY Honor.png
Cryptography
Vocational
Skill Level
123
Approval authority
North American Division
Year of Introduction
2025
See also


1

Define cryptography and list its major applications.


Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential.

When the message is encoded, only those who have been given the key or code book will know how to decode the secret message.

Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it.


2

Define the following terms:



2a

Code



2b

Cipher


Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text).


2c

Steganography



2d

Plain text



2e

Key




3

Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.


The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero."


4

Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.


Scytale in Greek means a baton.


5

Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:


The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I.


6

Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.


Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio.


7

Use steganography to write the Pathfinder Pledge.


The Navajo language was an unpublished language and no books in Navajo had ever been published.


8

Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.


The decree by Ptolemy V written on the Rosetta Stone appears in three languages.


9

Decrypt a message made by another person using the key and cipher type they used.



10


A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text.


11


A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text.



References