Difference between revisions of "AY Honors/Cryptography/Requirements/es"

From Pathfinder Wiki
< AY Honors‎ | CryptographyAY Honors/Cryptography/Requirements/es
(Updating to match new version of source page)
(Updating to match new version of source page)
Line 3: Line 3:
 
<section begin=Body />  
 
<section begin=Body />  
  
<b>1. <section begin=req1 /><noinclude></noinclude>¿Qué significa la palabra Criptografía? ¿Cuál es la diferencia entre esteganografía y criptografía?
+
<b>1. <section begin=req1 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req1 /></b>
+
</noinclude>Define cryptography and list its major applications.
 +
<noinclude>
 +
</div></noinclude><section end=req1 /></b>
  
<b>2. <section begin=req2 /><noinclude></noinclude>Conocer el significado de los siguientes términos:
+
<b>2. <section begin=req2 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2 /></b>
+
</noinclude>Define the following terms:
 +
<noinclude>
 +
</div></noinclude><section end=req2 /></b>
  
:<b>a. <section begin=req2a /><noinclude></noinclude>Cifrado
+
:<b>a. <section begin=req2a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2a /></b>
+
</noinclude>Code
 +
<noinclude>
 +
</div></noinclude><section end=req2a /></b>
  
:<b>b. <section begin=req2b /><noinclude></noinclude>Descifrado
+
:<b>b. <section begin=req2b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2b /></b>
+
</noinclude>Cipher
 +
<noinclude>
 +
</div></noinclude><section end=req2b /></b>
  
:<b>c. <section begin=req2c /><noinclude></noinclude>Texto sin formato
+
:<b>c. <section begin=req2c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2c /></b>
+
</noinclude>Steganography
 +
<noinclude>
 +
</div></noinclude><section end=req2c /></b>
  
:<b>d. <section begin=req2d /><noinclude></noinclude>Texto cifrado
+
:<b>d. <section begin=req2d /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2d /></b>
+
</noinclude>Plain text
 +
<noinclude>
 +
</div></noinclude><section end=req2d /></b>
  
:<b>e. <section begin=req2e /><noinclude></noinclude>Criptoanálisis
+
:<b>e. <section begin=req2e /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2e /></b>
+
</noinclude>Key
 +
<noinclude>
 +
</div></noinclude><section end=req2e /></b>
  
<b>3. <section begin=req3 /><noinclude></noinclude>¿Cuál es el significado original de la palabra «cifra»?
+
:<b>f. <section begin=req2f /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req3 /></b>
+
</noinclude>Public-key cryptography
 +
<noinclude>
 +
</div></noinclude><section end=req2f /></b>
 +
 
 +
:<b>g. <section begin=req2g /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>One-way function
 +
<noinclude>
 +
</div></noinclude><section end=req2g /></b>
 +
 
 +
<b>3. <section begin=req3 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.
 +
<noinclude>
 +
</div></noinclude><section end=req3 /></b>
 +
 
 +
:<b>a. <section begin=req3a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Transposition
 +
<noinclude>
 +
</div></noinclude><section end=req3a /></b>
 +
 
 +
:<b>b. <section begin=req3b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Polybius Square
 +
<noinclude>
 +
</div></noinclude><section end=req3b /></b>
 +
 
 +
:<b>c. <section begin=req3c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Square
 +
<noinclude>
 +
</div></noinclude><section end=req3c /></b>
 +
 
 +
:<b>d. <section begin=req3d /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Substitution
 +
<noinclude>
 +
</div></noinclude><section end=req3d /></b>
 +
 
 +
:<b>e. <section begin=req3e /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Polyalphabetic
 +
<noinclude>
 +
</div></noinclude><section end=req3e /></b>
 +
 
 +
<b>4. <section begin=req4 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.
 +
<noinclude>
 +
</div></noinclude><section end=req4 /></b>
 +
 
 +
:<b>a. <section begin=req4a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Processing done by a computer to determine if a user enters a correct password
 +
<noinclude>
 +
</div></noinclude><section end=req4a /></b>
 +
 
 +
:<b>b. <section begin=req4b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>A Bible verse reference
 +
<noinclude>
 +
</div></noinclude><section end=req4b /></b>
 +
 
 +
:<b>c. <section begin=req4c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>The colors used on a traffic light to mean "Stop," "Go," or "Caution"
 +
<noinclude>
 +
</div></noinclude><section end=req4c /></b>
 +
 
 +
:<b>d. <section begin=req4d /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>HTTPS:// used in a URL over the Internet
 +
<noinclude>
 +
</div></noinclude><section end=req4d /></b>
 +
 
 +
:<b>e. <section begin=req4e /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Forming a message by entering it into a grid row-by-row and reading it out column-by-column
 +
<noinclude>
 +
</div></noinclude><section end=req4e /></b>
 +
 
 +
:<b>f. <section begin=req4f /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Invisible ink
 +
<noinclude>
 +
</div></noinclude><section end=req4f /></b>
 +
 
 +
:<b>g. <section begin=req4g /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Navajo language used by the Code Talkers in World War II
 +
<noinclude>
 +
</div></noinclude><section end=req4g /></b>
 +
 
 +
:<b>h. <section begin=req4h /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Data representation via a grid of dots (QR codes) or lines (Bar codes)
 +
<noinclude>
 +
</div></noinclude><section end=req4h /></b>
 +
 
 +
:<b>i. <section begin=req4i /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Enigma machine used in World War II
 +
<noinclude>
 +
</div></noinclude><section end=req4i /></b>
 +
 
 +
:<b>j. <section begin=req4j /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Recording your computer password on a piece of paper
 +
<noinclude>
 +
</div></noinclude><section end=req4j /></b>
 +
 
 +
:<b>k. <section begin=req4k /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Signal used by Jonathan and David recounted in 1 Samuel 20:18-23
 +
<noinclude>
 +
</div></noinclude><section end=req4k /></b>
  
 
<section begin=challenge />
 
<section begin=challenge />
<b>4. <section begin=req4 /><noinclude></noinclude>¿Qué es una escítala? Hacer una escítala para enviar un mensaje secreto.
+
<b>5. <section begin=req5 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req4 /></b>
+
</noinclude>Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:
<section end=challenge />
+
<noinclude>
 +
</div></noinclude><section end=req5 /></b>
 +
 
 +
:<b>a. <section begin=req5a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Egyptian hieroglyphs, 1900 BC
 +
<noinclude>
 +
</div></noinclude><section end=req5a /></b>
  
<b>5. <section begin=req5 /><noinclude></noinclude>¿Qué es la máquina «Enigma» y cómo los mensajes codificados con Enigma finalmente se decodificaron?
+
:<b>b. <section begin=req5b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req5 /></b>
+
</noinclude>Hebrew Atbash cipher, 500 BC
 +
<noinclude>
 +
</div></noinclude><section end=req5b /></b>
  
<b>6. <section begin=req6 /><noinclude></noinclude>¿Qué se entiende por el término «locutor de claves» y cuándo se utilizó por primera vez la conversación de códigos?
+
:<b>c. <section begin=req5c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req6 /></b>
+
</noinclude>Julius Caesar's substitution cipher, 100 BC
 +
<noinclude>
 +
</div></noinclude><section end=req5c /></b>
 +
<section end=challenge />
  
<b>7. <section begin=req7 /><noinclude></noinclude>¿Por qué el idioma Navajo fue particularmente útil como código durante la Segunda Guerra Mundial?
+
<b>6. <section begin=req6 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req7 /></b>
+
</noinclude>Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.
 +
<noinclude>
 +
</div></noinclude><section end=req6 /></b>
  
<b>8. <section begin=req8 /><noinclude></noinclude>¿Qué es la Piedra de Rosetta y por qué es tan importante el descubrimiento de esta piedra?
+
<b>7. <section begin=req7 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req8 /></b>
+
</noinclude>Use steganography to write the Pathfinder Pledge.
 +
<noinclude>
 +
</div></noinclude><section end=req7 /></b>
  
<b>9. <section begin=req9 /><noinclude></noinclude>Mencionar algunos de los símbolos que aparecen casi como códigos usados en las profecías bíblicas y ser capaz de explicar sus significados.
+
<b>8. <section begin=req8 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req9 /></b>
+
</noinclude>Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.
 +
<noinclude>
 +
</div></noinclude><section end=req8 /></b>
  
<b>10. <section begin=req10 /><noinclude></noinclude>Saber qué es un cifrado por transposición y cómo codificar y decodificar un mensaje usándolo.
+
<b>9. <section begin=req9 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req10 /></b>
+
</noinclude>Decrypt a message made by another person using the key and cipher type they used.
 +
<noinclude>
 +
</div></noinclude><section end=req9 /></b>
  
<b>11. <section begin=req11 /><noinclude></noinclude>Saber qué es un cifrado por sustitución y cómo codificar y decodificar un mensaje usándolo.
 
<noinclude></noinclude><section end=req11 /></b>
 
 
<section end=Body />
 
<section end=Body />

Revision as of 18:08, 30 May 2025

Other languages:
English • ‎español • ‎français
Criptografía

Nivel de destreza

1

Año

2025

Version

29.09.2025

Autoridad de aprobación

División Norteamericana

Cryptography AY Honor.png
Criptografía
Actividades vocacionales
Nivel de destreza
123
Autoridad de aprobación
División Norteamericana
Año de introducción
2025
Vea también



1.

Define cryptography and list its major applications.

2.

Define the following terms:

a.

Code

b.

Cipher

c.

Steganography

d.

Plain text

e.

Key

f.

Public-key cryptography

g.

One-way function

3.

Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.

a.

Transposition

b.

Polybius Square

c.

Square

d.

Substitution

e.

Polyalphabetic

4.

Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.

a.

Processing done by a computer to determine if a user enters a correct password

b.

A Bible verse reference

c.

The colors used on a traffic light to mean "Stop," "Go," or "Caution"

d.

HTTPS:// used in a URL over the Internet

e.

Forming a message by entering it into a grid row-by-row and reading it out column-by-column

f.

Invisible ink

g.

Navajo language used by the Code Talkers in World War II

h.

Data representation via a grid of dots (QR codes) or lines (Bar codes)

i.

Enigma machine used in World War II

j.

Recording your computer password on a piece of paper

k.

Signal used by Jonathan and David recounted in 1 Samuel 20:18-23


5.

Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:

a.

Egyptian hieroglyphs, 1900 BC

b.

Hebrew Atbash cipher, 500 BC

c.

Julius Caesar's substitution cipher, 100 BC


6.

Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.

7.

Use steganography to write the Pathfinder Pledge.

8.

Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.

9.

Decrypt a message made by another person using the key and cipher type they used.