Difference between revisions of "AY Honors/Cryptography/Requirements/fr"

From Pathfinder Wiki
(Created page with "</noinclude>Qu'est-ce que le mot Cryptographie signifie ? Quelle est la différence entre la Cryptographie et la Stéganographie ? <noinclude>")
(Created page with "</noinclude>Savoir le sens des terms suivant : <noinclude>")
Line 6: Line 6:
 
<noinclude></noinclude><section end=req1 /></b>
 
<noinclude></noinclude><section end=req1 /></b>
  
<b>2. <section begin=req2 /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
+
<b>2. <section begin=req2 /><noinclude></noinclude>Savoir le sens des terms suivant :
</noinclude>Know the meaning of the following terms:
+
<noinclude></noinclude><section end=req2 /></b>
<noinclude>
 
</div></noinclude><section end=req2 /></b>
 
  
 
:<b>a. <section begin=req2a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">
 
:<b>a. <section begin=req2a /><noinclude><div lang="en" dir="ltr" class="mw-content-ltr">

Revision as of 09:26, 15 August 2022

Other languages:
English • ‎español • ‎français
Cryptographie

Niveau d'aptitude

2

An

2009

Version

01.12.2024

Autorité approbatrice

Union de l'Asie du Sud-Est

Cryptography AY Honor.png
Cryptographie
Régional
Niveau d'aptitude
123
Autorité approbatrice
Union de l'Asie du Sud-Est
Année d'introduction
2009
Voir également



1. Qu'est-ce que le mot Cryptographie signifie ? Quelle est la différence entre la Cryptographie et la Stéganographie ?

2. Savoir le sens des terms suivant :

a.

Encryption

b.

Decryption

c.

Plain text

d.

Cipher text

e.

Cryptanalysis

3.

What is the original meaning of the word “cipher?”


4.

What is a scytale? Make a scytale to send a secret message.


5.

What is the “Enigma” machine and how were the Enigma-coded messages finally decoded?

6.

What is meant by the term “code talkers” and when was code talking first used?

7.

Why was the Navajo language particularly useful as a code during World War II?

8.

What is the Rosetta Stone and why is the discovery of this stone so important?

9.

Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings.

10.

Know what a transposition cipher is and how to encode and decode a message using it.

11.

Know what a substitution cipher is and how to encode and decode a message using it.