Difference between revisions of "AY Honors/Cryptography/Requirements/fr"
(Updating to match new version of source page) |
|||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{HonorSubpage}} | {{HonorSubpage}} | ||
− | <section begin=Body /> | + | <section begin=Body /> |
− | <b>1. <section begin=req1 /><noinclude></noinclude> | + | <b>1. <section begin=req1 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end=req1 /></b> | + | </noinclude>Define cryptography and list its major applications. |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req1 /></b> | ||
− | <b>2. <section begin=req2 /><noinclude></noinclude> | + | <b>2. <section begin=req2 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end=req2 /></b> | + | </noinclude>Define the following terms: |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req2 /></b> | ||
− | :<b>a. <section begin=req2a /><noinclude></noinclude> | + | :<b>a. <section begin=req2a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end=req2a /></b> | + | </noinclude>Code |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req2a /></b> | ||
− | :<b>b. <section begin=req2b /><noinclude></noinclude> | + | :<b>b. <section begin=req2b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end=req2b /></b> | + | </noinclude>Cipher |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req2b /></b> | ||
− | :<b>c. <section begin=req2c /><noinclude></noinclude> | + | :<b>c. <section begin=req2c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end=req2c /></b> | + | </noinclude>Steganography |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req2c /></b> | ||
− | :<b>d. <section begin=req2d /><noinclude></noinclude> | + | :<b>d. <section begin=req2d /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end=req2d /></b> | + | </noinclude>Plain text |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req2d /></b> | ||
− | :<b>e. <section begin=req2e /><noinclude></noinclude> | + | :<b>e. <section begin=req2e /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end=req2e /></b> | + | </noinclude>Key |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req2e /></b> | ||
− | <b>3. <section begin=req3 /><noinclude></noinclude> | + | :<b>f. <section begin=req2f /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end=req3 /></b> | + | </noinclude>Public-key cryptography |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req2f /></b> | ||
+ | |||
+ | :<b>g. <section begin=req2g /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>One-way function | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req2g /></b> | ||
+ | |||
+ | <b>3. <section begin=req3 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique. | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req3 /></b> | ||
+ | |||
+ | :<b>a. <section begin=req3a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Transposition | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req3a /></b> | ||
+ | |||
+ | :<b>b. <section begin=req3b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Polybius Square | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req3b /></b> | ||
+ | |||
+ | :<b>c. <section begin=req3c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Square | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req3c /></b> | ||
+ | |||
+ | :<b>d. <section begin=req3d /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Substitution | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req3d /></b> | ||
+ | |||
+ | :<b>e. <section begin=req3e /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Polyalphabetic | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req3e /></b> | ||
+ | |||
+ | <b>4. <section begin=req4 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message. | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4 /></b> | ||
+ | |||
+ | :<b>a. <section begin=req4a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Processing done by a computer to determine if a user enters a correct password | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4a /></b> | ||
+ | |||
+ | :<b>b. <section begin=req4b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>A Bible verse reference | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4b /></b> | ||
+ | |||
+ | :<b>c. <section begin=req4c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>The colors used on a traffic light to mean "Stop," "Go," or "Caution" | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4c /></b> | ||
+ | |||
+ | :<b>d. <section begin=req4d /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>HTTPS:// used in a URL over the Internet | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4d /></b> | ||
+ | |||
+ | :<b>e. <section begin=req4e /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Forming a message by entering it into a grid row-by-row and reading it out column-by-column | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4e /></b> | ||
+ | |||
+ | :<b>f. <section begin=req4f /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Invisible ink | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4f /></b> | ||
+ | |||
+ | :<b>g. <section begin=req4g /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Navajo language used by the Code Talkers in World War II | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4g /></b> | ||
+ | |||
+ | :<b>h. <section begin=req4h /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Data representation via a grid of dots (QR codes) or lines (Bar codes) | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4h /></b> | ||
+ | |||
+ | :<b>i. <section begin=req4i /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Enigma machine used in World War II | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4i /></b> | ||
+ | |||
+ | :<b>j. <section begin=req4j /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Recording your computer password on a piece of paper | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4j /></b> | ||
+ | |||
+ | :<b>k. <section begin=req4k /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Signal used by Jonathan and David recounted in 1 Samuel 20:18-23 | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req4k /></b> | ||
<section begin=challenge /> | <section begin=challenge /> | ||
− | <b> | + | <b>5. <section begin=req5 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end= | + | </noinclude>Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message: |
− | <section end= | + | <noinclude> |
+ | </div></noinclude><section end=req5 /></b> | ||
+ | |||
+ | :<b>a. <section begin=req5a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> | ||
+ | </noinclude>Egyptian hieroglyphs, 1900 BC | ||
+ | <noinclude> | ||
+ | </div></noinclude><section end=req5a /></b> | ||
− | <b> | + | :<b>b. <section begin=req5b /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end= | + | </noinclude>Hebrew Atbash cipher, 500 BC |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req5b /></b> | ||
− | <b> | + | :<b>c. <section begin=req5c /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end= | + | </noinclude>Julius Caesar's substitution cipher, 100 BC |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req5c /></b> | ||
+ | <section end=challenge /> | ||
− | <b> | + | <b>6. <section begin=req6 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end= | + | </noinclude>Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used. |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req6 /></b> | ||
− | <b> | + | <b>7. <section begin=req7 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end= | + | </noinclude>Use steganography to write the Pathfinder Pledge. |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req7 /></b> | ||
− | <b> | + | <b>8. <section begin=req8 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end= | + | </noinclude>Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used. |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req8 /></b> | ||
− | <b> | + | <b>9. <section begin=req9 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr"> |
− | <noinclude></noinclude><section end= | + | </noinclude>Decrypt a message made by another person using the key and cipher type they used. |
+ | <noinclude> | ||
+ | </div></noinclude><section end=req9 /></b> | ||
− | |||
− | |||
<section end=Body /> | <section end=Body /> |
Latest revision as of 18:09, 30 May 2025
Niveau d'aptitude
1
An
2025
Version
02.06.2025
Autorité approbatrice
Division Nord-Américaine
Define cryptography and list its major applications.
Define the following terms:
- a.
Code
- b.
Cipher
- c.
Steganography
- d.
Plain text
- e.
Key
- f.
Public-key cryptography
- g.
One-way function
3.
Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.
- a.
Transposition
- b.
Polybius Square
- c.
Square
- d.
Substitution
- e.
Polyalphabetic
4.
Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.
- a.
Processing done by a computer to determine if a user enters a correct password
- b.
A Bible verse reference
- c.
The colors used on a traffic light to mean "Stop," "Go," or "Caution"
- d.
HTTPS:// used in a URL over the Internet
- e.
Forming a message by entering it into a grid row-by-row and reading it out column-by-column
- f.
Invisible ink
- g.
Navajo language used by the Code Talkers in World War II
- h.
Data representation via a grid of dots (QR codes) or lines (Bar codes)
- i.
Enigma machine used in World War II
- j.
Recording your computer password on a piece of paper
- k.
Signal used by Jonathan and David recounted in 1 Samuel 20:18-23
5.
Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:
- a.
Egyptian hieroglyphs, 1900 BC
- b.
Hebrew Atbash cipher, 500 BC
- c.
Julius Caesar's substitution cipher, 100 BC
6.
Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.
7.
Use steganography to write the Pathfinder Pledge.
8.
Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.
9.
Decrypt a message made by another person using the key and cipher type they used.