Difference between revisions of "AY Honors/Cryptography/Requirements/en"

From Pathfinder Wiki
< AY Honors‎ | CryptographyAY Honors/Cryptography/Requirements/en
(Updating to match new version of source page)
(Updating to match new version of source page)
 
Line 3: Line 3:
 
<section begin=Body />  
 
<section begin=Body />  
  
<b>1. <section begin=req1 /><noinclude></noinclude>What does the word Cryptography mean? What is the difference between Steganography and Cryptography?
+
<b>1. <section begin=req1 /><noinclude></noinclude>Define cryptography and list its major applications.
 
<noinclude></noinclude><section end=req1 /></b>
 
<noinclude></noinclude><section end=req1 /></b>
  
<b>2. <section begin=req2 /><noinclude></noinclude>Know the meaning of the following terms:
+
<b>2. <section begin=req2 /><noinclude></noinclude>Define the following terms:
 
<noinclude></noinclude><section end=req2 /></b>
 
<noinclude></noinclude><section end=req2 /></b>
  
:<b>a. <section begin=req2a /><noinclude></noinclude>Encryption
+
:<b>a. <section begin=req2a /><noinclude></noinclude>Code
 
<noinclude></noinclude><section end=req2a /></b>
 
<noinclude></noinclude><section end=req2a /></b>
  
:<b>b. <section begin=req2b /><noinclude></noinclude>Decryption
+
:<b>b. <section begin=req2b /><noinclude></noinclude>Cipher
 
<noinclude></noinclude><section end=req2b /></b>
 
<noinclude></noinclude><section end=req2b /></b>
  
:<b>c. <section begin=req2c /><noinclude></noinclude>Plain text
+
:<b>c. <section begin=req2c /><noinclude></noinclude>Steganography
 
<noinclude></noinclude><section end=req2c /></b>
 
<noinclude></noinclude><section end=req2c /></b>
  
:<b>d. <section begin=req2d /><noinclude></noinclude>Cipher text
+
:<b>d. <section begin=req2d /><noinclude></noinclude>Plain text
 
<noinclude></noinclude><section end=req2d /></b>
 
<noinclude></noinclude><section end=req2d /></b>
  
:<b>e. <section begin=req2e /><noinclude></noinclude>Cryptanalysis
+
:<b>e. <section begin=req2e /><noinclude></noinclude>Key
 
<noinclude></noinclude><section end=req2e /></b>
 
<noinclude></noinclude><section end=req2e /></b>
  
<b>3. <section begin=req3 /><noinclude></noinclude>What is the original meaning of the word “cipher?”
+
:<b>f. <section begin=req2f /><noinclude></noinclude>Public-key cryptography
 +
<noinclude></noinclude><section end=req2f /></b>
 +
 
 +
:<b>g. <section begin=req2g /><noinclude></noinclude>One-way function
 +
<noinclude></noinclude><section end=req2g /></b>
 +
 
 +
<b>3. <section begin=req3 /><noinclude></noinclude>Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.
 
<noinclude></noinclude><section end=req3 /></b>
 
<noinclude></noinclude><section end=req3 /></b>
  
<section begin=challenge />
+
:<b>a. <section begin=req3a /><noinclude></noinclude>Transposition
<b>4. <section begin=req4 /><noinclude></noinclude>What is a scytale? Make a scytale to send a secret message.
+
<noinclude></noinclude><section end=req3a /></b>
 +
 
 +
:<b>b. <section begin=req3b /><noinclude></noinclude>Polybius Square
 +
<noinclude></noinclude><section end=req3b /></b>
 +
 
 +
:<b>c. <section begin=req3c /><noinclude></noinclude>Square
 +
<noinclude></noinclude><section end=req3c /></b>
 +
 
 +
:<b>d. <section begin=req3d /><noinclude></noinclude>Substitution
 +
<noinclude></noinclude><section end=req3d /></b>
 +
 
 +
:<b>e. <section begin=req3e /><noinclude></noinclude>Polyalphabetic
 +
<noinclude></noinclude><section end=req3e /></b>
 +
 
 +
<b>4. <section begin=req4 /><noinclude></noinclude>Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.
 
<noinclude></noinclude><section end=req4 /></b>
 
<noinclude></noinclude><section end=req4 /></b>
<section end=challenge />
 
  
<b>5. <section begin=req5 /><noinclude></noinclude>What is the “Enigma” machine and how were the Enigma-coded messages finally decoded?
+
:<b>a. <section begin=req4a /><noinclude></noinclude>Processing done by a computer to determine if a user enters a correct password
 +
<noinclude></noinclude><section end=req4a /></b>
 +
 
 +
:<b>b. <section begin=req4b /><noinclude></noinclude>A Bible verse reference
 +
<noinclude></noinclude><section end=req4b /></b>
 +
 
 +
:<b>c. <section begin=req4c /><noinclude></noinclude>The colors used on a traffic light to mean "Stop," "Go," or "Caution"
 +
<noinclude></noinclude><section end=req4c /></b>
 +
 
 +
:<b>d. <section begin=req4d /><noinclude></noinclude>HTTPS:// used in a URL over the Internet
 +
<noinclude></noinclude><section end=req4d /></b>
 +
 
 +
:<b>e. <section begin=req4e /><noinclude></noinclude>Forming a message by entering it into a grid row-by-row and reading it out column-by-column
 +
<noinclude></noinclude><section end=req4e /></b>
 +
 
 +
:<b>f. <section begin=req4f /><noinclude></noinclude>Invisible ink
 +
<noinclude></noinclude><section end=req4f /></b>
 +
 
 +
:<b>g. <section begin=req4g /><noinclude></noinclude>Navajo language used by the Code Talkers in World War II
 +
<noinclude></noinclude><section end=req4g /></b>
 +
 
 +
:<b>h. <section begin=req4h /><noinclude></noinclude>Data representation via a grid of dots (QR codes) or lines (Bar codes)
 +
<noinclude></noinclude><section end=req4h /></b>
 +
 
 +
:<b>i. <section begin=req4i /><noinclude></noinclude>Enigma machine used in World War II
 +
<noinclude></noinclude><section end=req4i /></b>
 +
 
 +
:<b>j. <section begin=req4j /><noinclude></noinclude>Recording your computer password on a piece of paper
 +
<noinclude></noinclude><section end=req4j /></b>
 +
 
 +
:<b>k. <section begin=req4k /><noinclude></noinclude>Signal used by Jonathan and David recounted in 1 Samuel 20:18-23
 +
<noinclude></noinclude><section end=req4k /></b>
 +
 
 +
<section begin=challenge />
 +
<b>5. <section begin=req5 /><noinclude></noinclude>Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:
 
<noinclude></noinclude><section end=req5 /></b>
 
<noinclude></noinclude><section end=req5 /></b>
  
<b>6. <section begin=req6 /><noinclude></noinclude>What is meant by the term “code talkers” and when was code talking first used?
+
:<b>a. <section begin=req5a /><noinclude></noinclude>Egyptian hieroglyphs, 1900 BC
 +
<noinclude></noinclude><section end=req5a /></b>
 +
 
 +
:<b>b. <section begin=req5b /><noinclude></noinclude>Hebrew Atbash cipher, 500 BC
 +
<noinclude></noinclude><section end=req5b /></b>
 +
 
 +
:<b>c. <section begin=req5c /><noinclude></noinclude>Julius Caesar's substitution cipher, 100 BC
 +
<noinclude></noinclude><section end=req5c /></b>
 +
<section end=challenge />
 +
 
 +
<b>6. <section begin=req6 /><noinclude></noinclude>Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.
 
<noinclude></noinclude><section end=req6 /></b>
 
<noinclude></noinclude><section end=req6 /></b>
  
<b>7. <section begin=req7 /><noinclude></noinclude>Why was the Navajo language particularly useful as a code during World War II?
+
<b>7. <section begin=req7 /><noinclude></noinclude>Use steganography to write the Pathfinder Pledge.
 
<noinclude></noinclude><section end=req7 /></b>
 
<noinclude></noinclude><section end=req7 /></b>
  
<b>8. <section begin=req8 /><noinclude></noinclude>What is the Rosetta Stone and why is the discovery of this stone so important?
+
<b>8. <section begin=req8 /><noinclude></noinclude>Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.
 
<noinclude></noinclude><section end=req8 /></b>
 
<noinclude></noinclude><section end=req8 /></b>
  
<b>9. <section begin=req9 /><noinclude></noinclude>Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings.
+
<b>9. <section begin=req9 /><noinclude></noinclude>Decrypt a message made by another person using the key and cipher type they used.
 
<noinclude></noinclude><section end=req9 /></b>
 
<noinclude></noinclude><section end=req9 /></b>
  
<b>10. <section begin=req10 /><noinclude></noinclude>Know what a transposition cipher is and how to encode and decode a message using it.
 
<noinclude></noinclude><section end=req10 /></b>
 
 
<b>11. <section begin=req11 /><noinclude></noinclude>Know what a substitution cipher is and how to encode and decode a message using it.
 
<noinclude></noinclude><section end=req11 /></b>
 
 
<section end=Body />
 
<section end=Body />

Latest revision as of 18:09, 30 May 2025

Other languages:
English • ‎español • ‎français
Cryptography

Skill Level

1

Year

2025

Version

29.09.2025

Approval authority

North American Division

Cryptography AY Honor.png
Cryptography
Vocational
Skill Level
123
Approval authority
North American Division
Year of Introduction
2025



1. Define cryptography and list its major applications.

2. Define the following terms:

a. Code

b. Cipher

c. Steganography

d. Plain text

e. Key

f. Public-key cryptography

g. One-way function

3. Define each of the following categories of ciphers, give an example of each, and encipher your name using each technique.

a. Transposition

b. Polybius Square

c. Square

d. Substitution

e. Polyalphabetic

4. Investigate whether each item in the list below is a code, a cipher, steganography, or a plain text message.

a. Processing done by a computer to determine if a user enters a correct password

b. A Bible verse reference

c. The colors used on a traffic light to mean "Stop," "Go," or "Caution"

d. HTTPS:// used in a URL over the Internet

e. Forming a message by entering it into a grid row-by-row and reading it out column-by-column

f. Invisible ink

g. Navajo language used by the Code Talkers in World War II

h. Data representation via a grid of dots (QR codes) or lines (Bar codes)

i. Enigma machine used in World War II

j. Recording your computer password on a piece of paper

k. Signal used by Jonathan and David recounted in 1 Samuel 20:18-23


5. Classical cryptology is the study of codes and ciphers used in the past. Discover how the following cryptographic forms were encoded in antiquity, and try to duplicate their processes to record a message:

a. Egyptian hieroglyphs, 1900 BC

b. Hebrew Atbash cipher, 500 BC

c. Julius Caesar's substitution cipher, 100 BC


6. Prepare a message containing the Pathfinder Law enciphered in a Caesar cipher and indicate the key used.

7. Use steganography to write the Pathfinder Pledge.

8. Choose a cipher to encrypt a favorite Bible text and let another person decrypt it. Be sure to give that person the type of cipher and the key used.

9. Decrypt a message made by another person using the key and cipher type they used.