AY Honors/Cryptography

From Pathfinder Wiki
< AY HonorsAY Honors/Cryptography /
Revision as of 06:43, 13 January 2021 by Jomegat bot (talk | contribs) (Fix Tab Name transclusion)
Other languages:
English • ‎español • ‎português do Brasil

Template:Honor tab

Overview

The Challenging Part

The most challenging requirement of this honor is probably this:

4. What is a scytale? Make a scytale to send a secret message.

[[AY Honors/Cryptography/Requirements|Tab Name/Printable Version]]


1. What does the word Cryptography mean? What is the difference between Steganography and Cryptography?

2. Know the meaning of the following terms:

a. Encryption

b. Decryption

c. Plain text

d. Cipher text

e. Cryptanalysis

3. What is the original meaning of the word “cipher?”


4. What is a scytale? Make a scytale to send a secret message.


5. What is the “Enigma” machine and how were the Enigma-coded messages finally decoded?

6. What is meant by the term “code talkers” and when was code talking first used?

7. Why was the Navajo language particularly useful as a code during World War II?

8. What is the Rosetta Stone and why is the discovery of this stone so important?

9. Name some of the symbols that appear almost like codes used in Bible prophecies and be able to explain their meanings.

10. Know what a transposition cipher is and how to encode and decode a message using it.

11. Know what a substitution cipher is and how to encode and decode a message using it.

Printable Answer Key Tab Name/Edit Answer Key


1

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


Cryptography, or cryptology, is the art of concealing messages in order to keep them private or confidential.

When the message is encoded, only those who have been given the key or code book will know how to decode the secret message.

Steganography is the art of hiding the message with a "cover" so that what people see is the cover without realizing there is a secret message hidden within or under it.


2

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections



2a

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections



2b

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


Decryption is the reverse process where the unintelligible cipher text is converted back to plain text (normal text).


2c

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections



2d

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections



2e

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections




3

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


The word cipher comes from the Arabic word SIFR, meaning "empty" or "zero."


4

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


Scytale in Greek means a baton.


5

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


The first Enigma was invented by German engineer Arthur Scherbius at the end of World War I.


6

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


Code talkers refer to Native American soldiers who talk using a coded language to transmit secret messages over the radio.


7

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


The Navajo language was an unpublished language and no books in Navajo had ever been published.


8

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


The decree by Ptolemy V written on the Rosetta Stone appears in three languages.


9

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections



10

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


A transposition cipher is a method of encryption by which the positions held by units of plain text are shifted according to a regular system to create the cipher text.


11

Cannot access the database: :real_connect(): (HY000/1203): User d0347472 already has more than 'max_user_connections' active connections


A substitution cipher is a method of encryption by which the units of the plain text are replaced with other symbols which need not be the same as those used in the plain text.



References

[[Category:AY Honors/Regional|]]


Content on this wiki is generated by people like you, and no one has created a lesson plan for this honor yet. You could do that and make the world a better place.

See AY Honors/Model Lesson Plan if you need ideas for creating one.