Difference between revisions of "AY Honors/Cryptography/Answer Key"
m |
m |
||
(16 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | < | + | {{HonorSubpage}} |
− | <noinclude><translate><!--T: | + | <section begin="Body" /> |
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}} | ||
+ | <noinclude><translate><!--T:22--> | ||
</noinclude> | </noinclude> | ||
+ | <!-- 1. What does the word Cryptography mean? What is the difference between Steganography and Cryptography? --> | ||
− | <!--T: | + | <!--T:23--> |
− | + | Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | <!--T:24--> | |
+ | When the message is encoded, only those who have been given the key or code book will know how to decode the secret message. | ||
− | + | <!--T:25--> | |
+ | Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it. | ||
− | == | + | <!--T:26--> |
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 1 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}} | ||
+ | <noinclude><translate><!--T:27--> | ||
+ | </noinclude> | ||
+ | <!-- 2. Know the meaning of the following terms: --> | ||
− | == | + | <!--T:28--> |
+ | <noinclude></translate></noinclude> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}} <!--T:5--> | ||
+ | <noinclude><translate><!--T:29--> | ||
+ | </noinclude> | ||
− | == | + | <!--T:30--> |
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 2a --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}} <!--T:6--> | ||
+ | <noinclude><translate><!--T:31--> | ||
+ | </noinclude> | ||
− | + | <!--T:32--> | |
+ | Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text). | ||
− | === | + | <!--T:33--> |
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 2b --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}} <!--T:7--> | ||
+ | <noinclude><translate><!--T:34--> | ||
+ | </noinclude> | ||
+ | |||
+ | <!--T:35--> | ||
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 2c --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}} <!--T:8--> | ||
+ | <noinclude><translate><!--T:36--> | ||
+ | </noinclude> | ||
− | == | + | <!--T:37--> |
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 2d --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}} <!--T:9--> | ||
+ | <noinclude><translate><!--T:38--> | ||
+ | </noinclude> | ||
− | == | + | <!--T:39--> |
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 2e --> | ||
+ | {{CloseReq}} <!-- 2 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}} | ||
+ | <noinclude><translate><!--T:40--> | ||
+ | </noinclude> | ||
+ | <!-- 3. What is the original meaning of the word “cipher?” --> | ||
− | + | <!--T:41--> | |
+ | The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero." | ||
− | == | + | <!--T:42--> |
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 3 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}} | ||
+ | <noinclude><translate><!--T:43--> | ||
+ | </noinclude> | ||
+ | <!-- 4. What is a scytale? Make a scytale to send a secret message. --> | ||
− | + | <!--T:44--> | |
+ | Scytale in Greek means a baton. | ||
− | == | + | <!--T:45--> |
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 4 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}} | ||
+ | <noinclude><translate><!--T:46--> | ||
+ | </noinclude> | ||
+ | <!-- 5. What is the “Enigma” machine and how were the Enigma-coded messages finally decoded? --> | ||
− | + | <!--T:47--> | |
+ | The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I. | ||
− | == | + | <!--T:48--> |
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 5 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}} | ||
+ | <noinclude><translate><!--T:49--> | ||
+ | </noinclude> | ||
+ | <!-- 6. What is meant by the term “code talkers” and when was code talking first used? --> | ||
− | + | <!--T:50--> | |
+ | Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio. | ||
+ | <!--T:51--> | ||
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 6 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}} | ||
+ | <noinclude><translate><!--T:52--> | ||
+ | </noinclude> | ||
+ | <!-- 7. Why was the Navajo language particularly useful as a code during World War II? --> | ||
+ | |||
+ | <!--T:53--> | ||
+ | The Navajo language was an unpublished language and no books in Navajo had ever been published. | ||
+ | |||
+ | <!--T:54--> | ||
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 7 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}} | ||
+ | <noinclude><translate><!--T:55--> | ||
+ | </noinclude> | ||
+ | <!-- 8. What is the Rosetta Stone and why is the discovery of this stone so important? --> | ||
+ | |||
+ | <!--T:56--> | ||
+ | The decree by Ptolemy V written on the Rosetta Stone appears in three languages. | ||
+ | |||
+ | <!--T:57--> | ||
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 8 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}} | ||
+ | <noinclude><translate><!--T:58--> | ||
+ | </noinclude> | ||
+ | <!-- 9. Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings. --> | ||
+ | |||
+ | <!--T:59--> | ||
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 9 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}} | ||
+ | <noinclude><translate><!--T:60--> | ||
+ | </noinclude> | ||
+ | <!-- 10. Know what a transposition cipher is and how to encode and decode a message using it. --> | ||
+ | |||
+ | <!--T:61--> | ||
+ | A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text. | ||
+ | |||
+ | <!--T:62--> | ||
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 10 --> | ||
+ | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}} | ||
+ | <noinclude><translate><!--T:63--> | ||
+ | </noinclude> | ||
+ | <!-- 11. Know what a substitution cipher is and how to encode and decode a message using it. --> | ||
+ | |||
+ | <!--T:64--> | ||
+ | A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text. | ||
+ | |||
+ | <!--T:65--> | ||
+ | <noinclude></translate></noinclude> | ||
+ | {{CloseReq}} <!-- 11 --> | ||
+ | <noinclude><translate></noinclude> | ||
==References== <!--T:19--> | ==References== <!--T:19--> | ||
<!--T:20--> | <!--T:20--> | ||
* [https://www.youtube.com/watch?v=BQUcIkr4N-U Cryptology Pathfinder Honour on YouTube (sponsored by the British Union)] | * [https://www.youtube.com/watch?v=BQUcIkr4N-U Cryptology Pathfinder Honour on YouTube (sponsored by the British Union)] | ||
+ | * [https://youth.adventistchurch.org.uk/e-club-cryptography-honour PowerPoint and Answer Sheet] | ||
+ | <noinclude></translate></noinclude> | ||
− | + | [[Category:AY Honors/noindex{{GetLangSuffix}}|{{SUBPAGENAME}}]] | |
− | [[Category: | + | {{CloseHonorPage}} |
− |
Latest revision as of 14:25, 2 January 2023
1
Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential.
When the message is encoded, only those who have been given the key or code book will know how to decode the secret message.
Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it.
2
2a
2b
Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text).
2c
2d
2e
3
The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero."
4
Scytale in Greek means a baton.
5
The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I.
6
Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio.
7
The Navajo language was an unpublished language and no books in Navajo had ever been published.
8
The decree by Ptolemy V written on the Rosetta Stone appears in three languages.
9
10
A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text.
11
A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text.