Difference between revisions of "AY Honors/Cryptography/Answer Key"

From Pathfinder Wiki
< AY Honors‎ | CryptographyAY Honors/Cryptography/Answer Key
(Marked this version for translation)
Line 4: Line 4:
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:66-->
 +
</noinclude>
 
<!-- 1. Define cryptography and list its major applications. -->
 
<!-- 1. Define cryptography and list its major applications. -->
  
 +
<!--T:67-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 1 -->
 
{{CloseReq}} <!-- 1 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:68-->
 +
</noinclude>
 
<!-- 2. Define the following terms: -->
 
<!-- 2. Define the following terms: -->
  
 +
<!--T:69-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:70-->
 +
</noinclude>
  
 +
<!--T:71-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2a -->
 
{{CloseReq}} <!-- 2a -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:72-->
 +
</noinclude>
  
 +
<!--T:73-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2b -->
 
{{CloseReq}} <!-- 2b -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:74-->
 +
</noinclude>
  
 +
<!--T:75-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2c -->
 
{{CloseReq}} <!-- 2c -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:76-->
 +
</noinclude>
  
 +
<!--T:77-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2d -->
 
{{CloseReq}} <!-- 2d -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:78-->
 +
</noinclude>
  
 +
<!--T:79-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2e -->
 
{{CloseReq}} <!-- 2e -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2f}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:80-->
 +
</noinclude>
  
 +
<!--T:81-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2f -->
 
{{CloseReq}} <!-- 2f -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2g}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:82-->
 +
</noinclude>
  
 +
<!--T:83-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 2g -->
 
{{CloseReq}} <!-- 2g -->
Line 60: Line 78:
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:84-->
 +
</noinclude>
 
<!-- 3. What is the original meaning of the word “cipher?” -->
 
<!-- 3. What is the original meaning of the word “cipher?” -->
  
 +
<!--T:85-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3a}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:86-->
 +
</noinclude>
  
 +
<!--T:87-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 3a -->
 
{{CloseReq}} <!-- 3a -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3b}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:88-->
 +
</noinclude>
  
 +
<!--T:89-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 3b -->
 
{{CloseReq}} <!-- 3b -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3c}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:90-->
 +
</noinclude>
  
 +
<!--T:91-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 3c -->
 
{{CloseReq}} <!-- 3c -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3d}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:92-->
 +
</noinclude>
  
 +
<!--T:93-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 3d -->
 
{{CloseReq}} <!-- 3d -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3e}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:94-->
 +
</noinclude>
  
 +
<!--T:95-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 3e -->
 
{{CloseReq}} <!-- 3e -->
Line 97: Line 127:
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:96-->
 +
</noinclude>
 
<!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. -->
 
<!-- 4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. -->
  
 +
<!--T:97-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 4 -->
 
{{CloseReq}} <!-- 4 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:98-->
 +
</noinclude>
 
<!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: -->
 
<!-- 5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: -->
  
 +
<!--T:99-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 5 -->
 
{{CloseReq}} <!-- 5 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:100-->
 +
</noinclude>
 
<!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. -->
 
<!-- 6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. -->
  
 +
<!--T:101-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 6 -->
 
{{CloseReq}} <!-- 6 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:102-->
 +
</noinclude>
 
<!-- 7. Use steganography to write the Pathfinder Pledge. -->
 
<!-- 7. Use steganography to write the Pathfinder Pledge. -->
  
 +
<!--T:103-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 7 -->
 
{{CloseReq}} <!-- 7 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:104-->
 +
</noinclude>
 
<!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. -->
 
<!-- 8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. -->
  
 +
<!--T:105-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 8 -->
 
{{CloseReq}} <!-- 8 -->
  
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}
 
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}}
<noinclude><translate></noinclude>
+
<noinclude><translate><!--T:106-->
 +
</noinclude>
 
<!-- 9. Decrypt a message made by another person using the key and cipher type they used. -->
 
<!-- 9. Decrypt a message made by another person using the key and cipher type they used. -->
  
 +
<!--T:107-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
 
{{CloseReq}} <!-- 9 -->
 
{{CloseReq}} <!-- 9 -->
  
 
<noinclude><translate></noinclude>
 
<noinclude><translate></noinclude>
==References==
+
==References== <!--T:108-->
 
<noinclude></translate></noinclude>
 
<noinclude></translate></noinclude>
  

Revision as of 18:39, 30 May 2025

Other languages:
English • ‎español • ‎français
Cryptography

Skill Level

1

Year

2025

Version

13.09.2025

Approval authority

North American Division

Cryptography AY Honor.png
Cryptography
Vocational
Skill Level
123
Approval authority
North American Division
Year of Introduction
2025
See also



1

Define cryptography and list its major applications.




2

Define the following terms:



2a

Code




2b

Cipher




2c

Steganography




2d

Plain text




2e

Key




2f

Public-key cryptography




2g

One-way function





3

Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.



3a

Transposition




3b

Polybius Square




3c

Square




3d

Substitution




3e

Polyalphabetic





4

Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.




5

Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:




6

Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.




7

Use steganography to write the Pathfinder Pledge.




8

Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.




9

Decrypt a message made by another person using the key and cipher type they used.




References