Difference between revisions of "AY Honors/Cryptography/Answer Key"
Jomegat bot (talk | contribs) (Bot: Automated import of articles *** existing text overwritten ***) |
(Marked this version for translation) |
||
Line 2: | Line 2: | ||
<section begin="Body" /> | <section begin="Body" /> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=1}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:22--> |
+ | </noinclude> | ||
<!-- 1. What does the word Cryptography mean? What is the difference between Steganography and Cryptography? --> | <!-- 1. What does the word Cryptography mean? What is the difference between Steganography and Cryptography? --> | ||
+ | <!--T:23--> | ||
Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential. | Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential. | ||
+ | <!--T:24--> | ||
When the message is encoded, only those who have been given the key or code book will know how to decode the secret message. | When the message is encoded, only those who have been given the key or code book will know how to decode the secret message. | ||
+ | <!--T:25--> | ||
Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it. | Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it. | ||
+ | <!--T:26--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 1 --> | {{CloseReq}} <!-- 1 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:27--> |
+ | </noinclude> | ||
<!-- 2. Know the meaning of the following terms: --> | <!-- 2. Know the meaning of the following terms: --> | ||
+ | <!--T:28--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}} <!--T:5--> | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2a}} <!--T:5--> | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:29--> |
+ | </noinclude> | ||
+ | <!--T:30--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 2a --> | {{CloseReq}} <!-- 2a --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}} <!--T:6--> | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2b}} <!--T:6--> | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:31--> |
+ | </noinclude> | ||
+ | <!--T:32--> | ||
Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text). | Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text). | ||
+ | <!--T:33--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 2b --> | {{CloseReq}} <!-- 2b --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}} <!--T:7--> | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2c}} <!--T:7--> | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:34--> |
+ | </noinclude> | ||
+ | <!--T:35--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 2c --> | {{CloseReq}} <!-- 2c --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}} <!--T:8--> | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2d}} <!--T:8--> | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:36--> |
+ | </noinclude> | ||
+ | <!--T:37--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 2d --> | {{CloseReq}} <!-- 2d --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}} <!--T:9--> | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=2e}} <!--T:9--> | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:38--> |
+ | </noinclude> | ||
+ | <!--T:39--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 2e --> | {{CloseReq}} <!-- 2e --> | ||
{{CloseReq}} <!-- 2 --> | {{CloseReq}} <!-- 2 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=3}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:40--> |
+ | </noinclude> | ||
<!-- 3. What is the original meaning of the word “cipher?” --> | <!-- 3. What is the original meaning of the word “cipher?” --> | ||
+ | <!--T:41--> | ||
The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero." | The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero." | ||
+ | <!--T:42--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 3 --> | {{CloseReq}} <!-- 3 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=4}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:43--> |
+ | </noinclude> | ||
<!-- 4. What is a scytale? Make a scytale to send a secret message. --> | <!-- 4. What is a scytale? Make a scytale to send a secret message. --> | ||
+ | <!--T:44--> | ||
Scytale in Greek means a baton. | Scytale in Greek means a baton. | ||
+ | <!--T:45--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 4 --> | {{CloseReq}} <!-- 4 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=5}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:46--> |
+ | </noinclude> | ||
<!-- 5. What is the “Enigma” machine and how were the Enigma-coded messages finally decoded? --> | <!-- 5. What is the “Enigma” machine and how were the Enigma-coded messages finally decoded? --> | ||
+ | <!--T:47--> | ||
The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I. | The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I. | ||
+ | <!--T:48--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 5 --> | {{CloseReq}} <!-- 5 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=6}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:49--> |
+ | </noinclude> | ||
<!-- 6. What is meant by the term “code talkers” and when was code talking first used? --> | <!-- 6. What is meant by the term “code talkers” and when was code talking first used? --> | ||
+ | <!--T:50--> | ||
Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio. | Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio. | ||
+ | <!--T:51--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 6 --> | {{CloseReq}} <!-- 6 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=7}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:52--> |
+ | </noinclude> | ||
<!-- 7. Why was the Navajo language particularly useful as a code during World War II? --> | <!-- 7. Why was the Navajo language particularly useful as a code during World War II? --> | ||
+ | <!--T:53--> | ||
The Navajo language was an unpublished language and no books in Navajo had ever been published. | The Navajo language was an unpublished language and no books in Navajo had ever been published. | ||
+ | <!--T:54--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 7 --> | {{CloseReq}} <!-- 7 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=8}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:55--> |
+ | </noinclude> | ||
<!-- 8. What is the Rosetta Stone and why is the discovery of this stone so important? --> | <!-- 8. What is the Rosetta Stone and why is the discovery of this stone so important? --> | ||
+ | <!--T:56--> | ||
The decree by Ptolemy V written on the Rosetta Stone appears in three languages. | The decree by Ptolemy V written on the Rosetta Stone appears in three languages. | ||
+ | <!--T:57--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 8 --> | {{CloseReq}} <!-- 8 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=9}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:58--> |
+ | </noinclude> | ||
<!-- 9. Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings. --> | <!-- 9. Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings. --> | ||
+ | <!--T:59--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 9 --> | {{CloseReq}} <!-- 9 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=10}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:60--> |
+ | </noinclude> | ||
<!-- 10. Know what a transposition cipher is and how to encode and decode a message using it. --> | <!-- 10. Know what a transposition cipher is and how to encode and decode a message using it. --> | ||
+ | <!--T:61--> | ||
A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text. | A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text. | ||
+ | <!--T:62--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 10 --> | {{CloseReq}} <!-- 10 --> | ||
{{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}} | {{ansreq|page={{#titleparts:{{PAGENAME}}|2|1}}|num=11}} | ||
− | <noinclude><translate></noinclude> | + | <noinclude><translate><!--T:63--> |
+ | </noinclude> | ||
<!-- 11. Know what a substitution cipher is and how to encode and decode a message using it. --> | <!-- 11. Know what a substitution cipher is and how to encode and decode a message using it. --> | ||
+ | <!--T:64--> | ||
A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text. | A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text. | ||
+ | <!--T:65--> | ||
<noinclude></translate></noinclude> | <noinclude></translate></noinclude> | ||
{{CloseReq}} <!-- 11 --> | {{CloseReq}} <!-- 11 --> |
Revision as of 17:55, 19 May 2021
1
Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential.
When the message is encoded, only those who have been given the key or code book will know how to decode the secret message.
Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it.
2
2a
2b
Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text).
2c
2d
2e
3
The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero."
4
Scytale in Greek means a baton.
5
The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I.
6
Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio.
7
The Navajo language was an unpublished language and no books in Navajo had ever been published.
8
The decree by Ptolemy V written on the Rosetta Stone appears in three languages.
9
10
A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text.
11
A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text.