Difference between revisions of "AY Honors/Cryptography/Requirements/fr"

From Pathfinder Wiki
(Updating to match new version of source page)
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 
{{HonorSubpage}}
 
{{HonorSubpage}}
  
<section begin=Body />
+
<section begin=Body />  
  
<b>1. <section begin=req1 /><noinclude></noinclude>Qu'est-ce que le mot Cryptographie signifie? Quelle est la différence entre la Cryptographie et la Stéganographie?
+
<b>1. <section begin=req1 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req1 /></b>
+
</noinclude>Define cryptography and list its major applications.
 +
<noinclude>
 +
</div></noinclude><section end=req1 /></b>
  
<b>2. <section begin=req2 /><noinclude></noinclude>Savoir le sens des termes suivant:
+
<b>2. <section begin=req2 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2 /></b>
+
</noinclude>Define the following terms:
 +
<noinclude>
 +
</div></noinclude><section end=req2 /></b>
  
:<b>a. <section begin=req2a /><noinclude></noinclude>Chiffrer
+
:<b>a. <section begin=req2a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2a /></b>
+
</noinclude>Code
 +
<noinclude>
 +
</div></noinclude><section end=req2a /></b>
  
:<b>b. <section begin=req2b /><noinclude></noinclude>Déchiffrer
+
:<b>b. <section begin=req2b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2b /></b>
+
</noinclude>Cipher
 +
<noinclude>
 +
</div></noinclude><section end=req2b /></b>
  
:<b>c. <section begin=req2c /><noinclude></noinclude>Texte en clair
+
:<b>c. <section begin=req2c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2c /></b>
+
</noinclude>Steganography
 +
<noinclude>
 +
</div></noinclude><section end=req2c /></b>
  
:<b>d. <section begin=req2d /><noinclude></noinclude>Texte chiffré
+
:<b>d. <section begin=req2d /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2d /></b>
+
</noinclude>Plain text
 +
<noinclude>
 +
</div></noinclude><section end=req2d /></b>
  
:<b>e. <section begin=req2e /><noinclude></noinclude>Cryptanalyse
+
:<b>e. <section begin=req2e /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req2e /></b>
+
</noinclude>Key
 +
<noinclude>
 +
</div></noinclude><section end=req2e /></b>
  
<b>3. <section begin=req3 /><noinclude></noinclude>Quel est le sens original du mot «chiffrer»?
+
:<b>f. <section begin=req2f /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req3 /></b>
+
</noinclude>Public-key cryptography
 +
<noinclude>
 +
</div></noinclude><section end=req2f /></b>
 +
 
 +
:<b>g. <section begin=req2g /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>One-way function
 +
<noinclude>
 +
</div></noinclude><section end=req2g /></b>
 +
 
 +
<b>3. <section begin=req3 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.
 +
<noinclude>
 +
</div></noinclude><section end=req3 /></b>
 +
 
 +
:<b>a. <section begin=req3a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Transposition
 +
<noinclude>
 +
</div></noinclude><section end=req3a /></b>
 +
 
 +
:<b>b. <section begin=req3b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Polybius Square
 +
<noinclude>
 +
</div></noinclude><section end=req3b /></b>
 +
 
 +
:<b>c. <section begin=req3c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Square
 +
<noinclude>
 +
</div></noinclude><section end=req3c /></b>
 +
 
 +
:<b>d. <section begin=req3d /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Substitution
 +
<noinclude>
 +
</div></noinclude><section end=req3d /></b>
 +
 
 +
:<b>e. <section begin=req3e /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Polyalphabetic
 +
<noinclude>
 +
</div></noinclude><section end=req3e /></b>
 +
 
 +
<b>4. <section begin=req4 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.
 +
<noinclude>
 +
</div></noinclude><section end=req4 /></b>
 +
 
 +
:<b>a. <section begin=req4a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Processing done by a computer to determine if a user enters a correct password
 +
<noinclude>
 +
</div></noinclude><section end=req4a /></b>
 +
 
 +
:<b>b. <section begin=req4b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>A Bible verse reference
 +
<noinclude>
 +
</div></noinclude><section end=req4b /></b>
 +
 
 +
:<b>c. <section begin=req4c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>The colors used on a traffic light to mean "Stop," "Go," or "Caution"
 +
<noinclude>
 +
</div></noinclude><section end=req4c /></b>
 +
 
 +
:<b>d. <section begin=req4d /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>HTTPS:// used in a URL over the Internet
 +
<noinclude>
 +
</div></noinclude><section end=req4d /></b>
 +
 
 +
:<b>e. <section begin=req4e /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Forming a message by entering it into a grid row-by-row and reading it out column-by-column
 +
<noinclude>
 +
</div></noinclude><section end=req4e /></b>
 +
 
 +
:<b>f. <section begin=req4f /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Invisible ink
 +
<noinclude>
 +
</div></noinclude><section end=req4f /></b>
 +
 
 +
:<b>g. <section begin=req4g /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Navajo language used by the Code Talkers in World War II
 +
<noinclude>
 +
</div></noinclude><section end=req4g /></b>
 +
 
 +
:<b>h. <section begin=req4h /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Data representation via a grid of dots (QR codes) or lines (Bar codes)
 +
<noinclude>
 +
</div></noinclude><section end=req4h /></b>
 +
 
 +
:<b>i. <section begin=req4i /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Enigma machine used in World War II
 +
<noinclude>
 +
</div></noinclude><section end=req4i /></b>
 +
 
 +
:<b>j. <section begin=req4j /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Recording your computer password on a piece of paper
 +
<noinclude>
 +
</div></noinclude><section end=req4j /></b>
 +
 
 +
:<b>k. <section begin=req4k /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Signal used by Jonathan and David recounted in 1 Samuel 20:18-23
 +
<noinclude>
 +
</div></noinclude><section end=req4k /></b>
  
 
<section begin=challenge />
 
<section begin=challenge />
<b>4. <section begin=req4 /><noinclude></noinclude>Qu'est-ce qu'un scytale? Réalise un scytale pour envoyer un message secret.
+
<b>5. <section begin=req5 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req4 /></b>
+
</noinclude>Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:
<section end=challenge />
+
<noinclude>
 +
</div></noinclude><section end=req5 /></b>
 +
 
 +
:<b>a. <section begin=req5a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 +
</noinclude>Egyptian hieroglyphs, 1900 BC
 +
<noinclude>
 +
</div></noinclude><section end=req5a /></b>
  
<b>5. <section begin=req5 /><noinclude></noinclude>Qu'est-ce que la la machine «Enigma» et comment ses messages chiffrés ont été décryptés?
+
:<b>b. <section begin=req5b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req5 /></b>
+
</noinclude>Hebrew Atbash cipher, 500 BC
 +
<noinclude>
 +
</div></noinclude><section end=req5b /></b>
  
<b>6. <section begin=req6 /><noinclude></noinclude>Qu'est-ce que représente le terme «code talkers» et quand est-ce que cette pratique à été utilisé pour la première fois?
+
:<b>c. <section begin=req5c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req6 /></b>
+
</noinclude>Julius Caesar's substitution cipher, 100 BC
 +
<noinclude>
 +
</div></noinclude><section end=req5c /></b>
 +
<section end=challenge />
  
<b>7. <section begin=req7 /><noinclude></noinclude>Pourquoi la langue des Navajo était particulièrement utile en tant que code durant la Seconde Guerre Mondiale?
+
<b>6. <section begin=req6 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req7 /></b>
+
</noinclude>Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.
 +
<noinclude>
 +
</div></noinclude><section end=req6 /></b>
  
<b>8. <section begin=req8 /><noinclude></noinclude>Qu'est-ce que la Pierre de Rosette et pourquoi sa découverte est si importante?
+
<b>7. <section begin=req7 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req8 /></b>
+
</noinclude>Use steganography to write the Pathfinder Pledge.
 +
<noinclude>
 +
</div></noinclude><section end=req7 /></b>
  
<b>9. <section begin=req9 /><noinclude></noinclude>Nommer certains des symboles qui apparaissent comme des codes utilisés dans des prophéties Biblique et être capable d'expliquer leurs signification.
+
<b>8. <section begin=req8 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req9 /></b>
+
</noinclude>Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.
 +
<noinclude>
 +
</div></noinclude><section end=req8 /></b>
  
<b>10. <section begin=req10 /><noinclude></noinclude>Savoir ce qu'est un chiffrement par transposition et comment chiffrer/déchiffrer un message avec cette méthode.
+
<b>9. <section begin=req9 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
<noinclude></noinclude><section end=req10 /></b>
+
</noinclude>Decrypt a message made by another person using the key and cipher type they used.
 +
<noinclude>
 +
</div></noinclude><section end=req9 /></b>
  
<b>11. <section begin=req11 /><noinclude></noinclude>Savoir ce qu'est un chiffrement par substitution et comment chiffrer/déchiffrer un message avec cette méthode.
 
<noinclude></noinclude><section end=req11 /></b>
 
 
<section end=Body />
 
<section end=Body />

Latest revision as of 18:09, 30 May 2025

Other languages:
English • ‎español • ‎français
Cryptographie

Niveau d'aptitude

1

An

2025

Version

02.06.2025

Autorité approbatrice

Division Nord-Américaine

No Patch - FRENCH.png
Cryptographie
Vocation
Niveau d'aptitude
123
Autorité approbatrice
Division Nord-Américaine
Année d'introduction
2025
Voir également



1.

Define cryptography and list its major applications.

2.

Define the following terms:

a.

Code

b.

Cipher

c.

Steganography

d.

Plain text

e.

Key

f.

Public-key cryptography

g.

One-way function

3.

Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.

a.

Transposition

b.

Polybius Square

c.

Square

d.

Substitution

e.

Polyalphabetic

4.

Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.

a.

Processing done by a computer to determine if a user enters a correct password

b.

A Bible verse reference

c.

The colors used on a traffic light to mean "Stop," "Go," or "Caution"

d.

HTTPS:// used in a URL over the Internet

e.

Forming a message by entering it into a grid row-by-row and reading it out column-by-column

f.

Invisible ink

g.

Navajo language used by the Code Talkers in World War II

h.

Data representation via a grid of dots (QR codes) or lines (Bar codes)

i.

Enigma machine used in World War II

j.

Recording your computer password on a piece of paper

k.

Signal used by Jonathan and David recounted in 1 Samuel 20:18-23


5.

Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:

a.

Egyptian hieroglyphs, 1900 BC

b.

Hebrew Atbash cipher, 500 BC

c.

Julius Caesar's substitution cipher, 100 BC


6.

Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.

7.

Use steganography to write the Pathfinder Pledge.

8.

Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.

9.

Decrypt a message made by another person using the key and cipher type they used.