Difference between revisions of "AY Honors/Cryptography/Answer Key"

From Pathfinder Wiki
< AY Honors‎ | CryptographyAY Honors/Cryptography/Answer Key
m
m
(14 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<languages /><br />
+
{{HonorSubpage}}
<noinclude><translate><!--T:1-->
+
<section begin="Body" />  
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}
 +
<noinclude><translate><!--T:22-->
 
</noinclude>
 
</noinclude>
 +
<!-- 1. What does the word Cryptography mean? What is the difference between Steganography and Cryptography? -->
  
<!--T:2-->
+
<!--T:23-->
{{honor_desc
+
Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential.
|stage=00
 
|honorname=Cryptology
 
|skill=2
 
|year=2009
 
|category=Vocational
 
|authority=Southeast Asia Union
 
|insignia_source=SEAU
 
|insignia=Cryptology AY Honour.png}}
 
  
==1. What does the word Cryptography mean? What is the difference between Steganography and Cryptography?== <!--T:3-->
+
<!--T:24-->
 +
When the message is encoded, only those who have been given the key or code book will know how to decode the secret message.
  
==2. Know the meaning of the following terms:== <!--T:4-->
+
<!--T:25-->
 +
Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it.
  
===a. Encryption=== <!--T:5-->
+
<!--T:26-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 1 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}
 +
<noinclude><translate><!--T:27-->
 +
</noinclude>
 +
<!-- 2. Know the meaning of the following terms: -->
  
===b. Decryption=== <!--T:6-->
+
<!--T:28-->
 +
<noinclude></translate></noinclude>
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}} <!--T:5-->
 +
<noinclude><translate><!--T:29-->
 +
</noinclude>
  
===c. Plain text=== <!--T:7-->
+
<!--T:30-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 2a -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}} <!--T:6-->
 +
<noinclude><translate><!--T:31-->
 +
</noinclude>
  
===d. Cipher text=== <!--T:8-->
+
<!--T:32-->
 +
Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text).
  
===e. Cryptanalysis=== <!--T:9-->
+
<!--T:33-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 2b -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}} <!--T:7-->
 +
<noinclude><translate><!--T:34-->
 +
</noinclude>
 +
 
 +
<!--T:35-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 2c -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}} <!--T:8-->
 +
<noinclude><translate><!--T:36-->
 +
</noinclude>
  
==3. What is the original meaning of the word “cipher?”== <!--T:10-->
+
<!--T:37-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 2d -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}} <!--T:9-->
 +
<noinclude><translate><!--T:38-->
 +
</noinclude>
  
==4. What is a scytale? Make a scytale to send a secret message.== <!--T:11-->
+
<!--T:39-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 2e -->
 +
{{CloseReq}} <!-- 2 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}
 +
<noinclude><translate><!--T:40-->
 +
</noinclude>
 +
<!-- 3. What is the original meaning of the word “cipher?” -->
  
==5. What is the “Enigma” machine and how were the Enigma-coded messages finally decoded?== <!--T:12-->
+
<!--T:41-->
 +
The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero."
  
==6. What is meant by the term “code talkers” and when was code talking first used?== <!--T:13-->
+
<!--T:42-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 3 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}
 +
<noinclude><translate><!--T:43-->
 +
</noinclude>
 +
<!-- 4. What is a scytale? Make a scytale to send a secret message. -->
  
==7. Why was the Navajo language particularly useful as a code during World War II?== <!--T:14-->
+
<!--T:44-->
 +
Scytale in Greek means a baton.
  
==8. What is the Rosetta Stone and why is the discovery of this stone so important?== <!--T:15-->
+
<!--T:45-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 4 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}
 +
<noinclude><translate><!--T:46-->
 +
</noinclude>
 +
<!-- 5. What is the “Enigma” machine and how were the Enigma-coded messages finally decoded? -->
  
==9. Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings.== <!--T:16-->
+
<!--T:47-->
 +
The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I.
  
==10. Know what a transposition cipher is and how to encode and decode a message using it.== <!--T:17-->
+
<!--T:48-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 5 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}
 +
<noinclude><translate><!--T:49-->
 +
</noinclude>
 +
<!-- 6. What is meant by the term “code talkers” and when was code talking first used? -->
  
==11. Know what a substitution cipher is and how to encode and decode a message using it.== <!--T:18-->
+
<!--T:50-->
 +
Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio.
  
 +
<!--T:51-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 6 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}
 +
<noinclude><translate><!--T:52-->
 +
</noinclude>
 +
<!-- 7. Why was the Navajo language particularly useful as a code during World War II? -->
 +
 +
<!--T:53-->
 +
The Navajo language was an unpublished language and no books in Navajo had ever been published.
 +
 +
<!--T:54-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 7 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}
 +
<noinclude><translate><!--T:55-->
 +
</noinclude>
 +
<!-- 8. What is the Rosetta Stone and why is the discovery of this stone so important? -->
 +
 +
<!--T:56-->
 +
The decree by Ptolemy V written on the Rosetta Stone appears in three languages.
 +
 +
<!--T:57-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 8 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}
 +
<noinclude><translate><!--T:58-->
 +
</noinclude>
 +
<!-- 9. Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings. -->
 +
 +
<!--T:59-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 9 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}}
 +
<noinclude><translate><!--T:60-->
 +
</noinclude>
 +
<!-- 10. Know what a transposition cipher is and how to encode and decode a message using it. -->
 +
 +
<!--T:61-->
 +
A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text.
 +
 +
<!--T:62-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 10 -->
 +
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}}
 +
<noinclude><translate><!--T:63-->
 +
</noinclude>
 +
<!-- 11. Know what a substitution cipher is and how to encode and decode a message using it. -->
 +
 +
<!--T:64-->
 +
A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text.
 +
 +
<!--T:65-->
 +
<noinclude></translate></noinclude>
 +
{{CloseReq}} <!-- 11 -->
 +
<noinclude><translate></noinclude>
 
==References== <!--T:19-->
 
==References== <!--T:19-->
  
 
<!--T:20-->
 
<!--T:20-->
 
* [https://www.youtube.com/watch?v=BQUcIkr4N-U Cryptology Pathfinder Honour on YouTube (sponsored by the British Union)]
 
* [https://www.youtube.com/watch?v=BQUcIkr4N-U Cryptology Pathfinder Honour on YouTube (sponsored by the British Union)]
 +
* [https://youth.adventistchurch.org.uk/e-club-cryptography-honour PowerPoint and Answer Sheet]
 +
<noinclude></translate></noinclude>
  
<!--T:21-->
+
[[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]]
[[Category:Adventist Youth Honors Answer Book|{{SUBPAGENAME}}]]
+
{{CloseHonorPage}}
<noinclude></translate></noinclude>
 

Revision as of 14:25, 2 January 2023

Other languages:
English • ‎español • ‎français
Cryptography

Skill Level

1

Year

2025

Version

18.12.2025

Approval authority

North American Division

Cryptography AY Honor.png
Cryptography
Vocational
Skill Level
123
Approval authority
North American Division
Year of Introduction
2025
See also


1

Define cryptography and list its major applications.


Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential.

When the message is encoded, only those who have been given the key or code book will know how to decode the secret message.

Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it.


2

Define the following terms:



2a

Code



2b

Cipher


Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text).


2c

Steganography



2d

Plain text



2e

Key




3

Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.


The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero."


4

Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.


Scytale in Greek means a baton.


5

Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:


The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I.


6

Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.


Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio.


7

Use steganography to write the Pathfinder Pledge.


The Navajo language was an unpublished language and no books in Navajo had ever been published.


8

Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.


The decree by Ptolemy V written on the Rosetta Stone appears in three languages.


9

Decrypt a message made by another person using the key and cipher type they used.



10


A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text.


11


A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text.



References