Geometry / Mr. Hansen |
Name: ________________________ |
Worksheet for Students Not Attending Field Trip
|
Instructions: Turn in this worksheet at the start of class on Tuesday, May 21. All answers can be found on the Web with a little bit of research. If you locate a book on cryptography, many of the answers may be found in one place. If you cannot answer all of the questions, you must furnish a librarian’s signature to establish that you indeed researched these questions for 50 minutes. Librarian’s signature: _________________________ Start time: _______Librarian’s signature: _________________________ End time: _______ |
1. |
What was the name of the cryptographic encipherment machine (a commercial product name) that the Nazis used in World War II? |
2. |
What was the name of the secret center north of London that British mathematicians and intelligence agents used as their base of operations for code-breaking during World War II? |
3. |
Where in the Washington, D.C., area did the U.S. Navy decode intercepted Nazi messages with the aid of the "Bombe" (an early electro-mechanical quasi-computer depicted in the movie Enigma)? |
4. |
Approximately how many people were employed at that U.S. Navy decoding facility? |
5. |
List the 13 organizations that make up the U.S. intelligence community. |
6. |
Briefly state the two purposes of the NSA (National Security Agency). |
7. |
What is a one-way hash function? |
8. |
Briefly (in 1-2 sentences) explain the difference between a symmetric cryptosystem and a public-key cryptosystem. |
9. |
Briefly (in 1-2 sentences) explain the purpose of a zero-knowledge protocol in a modern cryptosystem. |