Geometry / Mr. Hansen
5/20/2002

Name: ________________________

Worksheet for Students Not Attending Field Trip

 

Instructions: Turn in this worksheet at the start of class on Tuesday, May 21. All answers can be found on the Web with a little bit of research. If you locate a book on cryptography, many of the answers may be found in one place. If you cannot answer all of the questions, you must furnish a librarian’s signature to establish that you indeed researched these questions for 50 minutes.

Librarian’s signature: _________________________ Start time: _______

Librarian’s signature: _________________________ End time: _______

1.

What was the name of the cryptographic encipherment machine (a commercial product name) that the Nazis used in World War II?

2.

What was the name of the secret center north of London that British mathematicians and intelligence agents used as their base of operations for code-breaking during World War II?

3.

Where in the Washington, D.C., area did the U.S. Navy decode intercepted Nazi messages with the aid of the "Bombe" (an early electro-mechanical quasi-computer depicted in the movie Enigma)?

4.

Approximately how many people were employed at that U.S. Navy decoding facility?

5.

List the 13 organizations that make up the U.S. intelligence community.



6.

Briefly state the two purposes of the NSA (National Security Agency).



7.

What is a one-way hash function?




8.

Briefly (in 1-2 sentences) explain the difference between a symmetric cryptosystem and a public-key cryptosystem.




9.

Briefly (in 1-2 sentences) explain the purpose of a zero-knowledge protocol in a modern cryptosystem.