<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.pathfindersonline.org/index.php?action=history&amp;feed=atom&amp;title=Talk%3AAdventist_Youth_Honors_Answer_Book%2FRegional%2FCryptology</id>
	<title>Talk:Adventist Youth Honors Answer Book/Regional/Cryptology - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.pathfindersonline.org/index.php?action=history&amp;feed=atom&amp;title=Talk%3AAdventist_Youth_Honors_Answer_Book%2FRegional%2FCryptology"/>
	<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=Talk:Adventist_Youth_Honors_Answer_Book/Regional/Cryptology&amp;action=history"/>
	<updated>2026-04-18T04:01:32Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.5</generator>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=Talk:Adventist_Youth_Honors_Answer_Book/Regional/Cryptology&amp;diff=265798&amp;oldid=prev</id>
		<title>Jomegat at 00:43, 28 April 2020</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=Talk:Adventist_Youth_Honors_Answer_Book/Regional/Cryptology&amp;diff=265798&amp;oldid=prev"/>
		<updated>2020-04-28T00:43:44Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 00:43, 28 April 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot; &gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;**An asymmetric key system uses one key to encrypt and a different one to decrypt.  Once a message is encrypted, the encryption key cannot be used to decrypt it.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;**An asymmetric key system uses one key to encrypt and a different one to decrypt.  Once a message is encrypted, the encryption key cannot be used to decrypt it.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*public/private keys&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*public/private keys&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;**A form of asymmetric keys where one key is secret and the other is public.  The public key &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;is &lt;/del&gt;used to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;encrypted &lt;/del&gt;a message that only the holder of the private key can decrypt.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;**A form of asymmetric keys where one key is secret and the other is public.  The public key &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;can be &lt;/ins&gt;used to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;encrypt &lt;/ins&gt;a message that only the holder of the private key can decrypt&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;.  This is how end-to-end encrypted messaging systems work&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Crypto &lt;/del&gt;signatures&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Digital &lt;/ins&gt;signatures&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;**A message can be signed &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;to show that &lt;/del&gt;it &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;was generated &lt;/del&gt;by the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;entity &lt;/del&gt;holding the private key &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;by using &lt;/del&gt;the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;private key &lt;/del&gt;to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;encode a message that anyone can decrypt using &lt;/del&gt;the public &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;key&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;**A message can be signed &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;by encrypting a message with a private key. Anyone can decrypt &lt;/ins&gt;it &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;using the public key. The message could only have been encrypted &lt;/ins&gt;by the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;one &lt;/ins&gt;holding the private key &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;(thus proving it came from that entity).  This is basically the same as &lt;/ins&gt;the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;end-&lt;/ins&gt;to&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;-end encryption as described above, except &lt;/ins&gt;the public &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;and private keys switch roles.  It forms the basis of blockchain (i.e., Bitcoin)&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Diffie &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Hillman &lt;/ins&gt;exchange&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*Diffie &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Hilman &lt;/del&gt;exchange&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;**A way for two parties to create a secret key &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;that they can share &lt;/ins&gt;by combining their private keys &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;over a public medium &lt;/ins&gt;without &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;actually &lt;/ins&gt;exchanging &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;or revealing &lt;/ins&gt;their private keys&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, and without an eavesdropper being able to reconstruct the resultant secret shared key&lt;/ins&gt;.  &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Once they have a private shared key they can switch &lt;/ins&gt;to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;symmetric cryptography which is way faster than asymmetric crypto.  This is how https works&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;**A way for two parties to create a secret &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;shared &lt;/del&gt;key by combining their private keys without exchanging their private keys.  &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;It's pretty cool, but hard &lt;/del&gt;to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;explain in one sentence&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key PathWiki:diff::1.12:old-265796:rev-265798 --&gt;
&lt;/table&gt;</summary>
		<author><name>Jomegat</name></author>
	</entry>
	<entry>
		<id>https://wiki.pathfindersonline.org/index.php?title=Talk:Adventist_Youth_Honors_Answer_Book/Regional/Cryptology&amp;diff=265796&amp;oldid=prev</id>
		<title>Jomegat: Created page with &quot;This looks like a cool honor.  If the NAD decides to adopt it (or maybe have an advanced version) I think it should touch on these topics:  *symmetric/asymmetric cryptography...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.pathfindersonline.org/index.php?title=Talk:Adventist_Youth_Honors_Answer_Book/Regional/Cryptology&amp;diff=265796&amp;oldid=prev"/>
		<updated>2020-04-28T00:22:51Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;This looks like a cool honor.  If the NAD decides to adopt it (or maybe have an advanced version) I think it should touch on these topics:  *symmetric/asymmetric cryptography...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;This looks like a cool honor.  If the NAD decides to adopt it (or maybe have an advanced version) I think it should touch on these topics:&lt;br /&gt;
&lt;br /&gt;
*symmetric/asymmetric cryptography keys&lt;br /&gt;
**A symmetric key uses a single key to both encrypt and decrypt.  Also called a shared key.&lt;br /&gt;
**An asymmetric key system uses one key to encrypt and a different one to decrypt.  Once a message is encrypted, the encryption key cannot be used to decrypt it.&lt;br /&gt;
*public/private keys&lt;br /&gt;
**A form of asymmetric keys where one key is secret and the other is public.  The public key is used to encrypted a message that only the holder of the private key can decrypt.&lt;br /&gt;
*Crypto signatures&lt;br /&gt;
**A message can be signed to show that it was generated by the entity holding the private key by using the private key to encode a message that anyone can decrypt using the public key.&lt;br /&gt;
&lt;br /&gt;
*Diffie Hilman exchange&lt;br /&gt;
**A way for two parties to create a secret shared key by combining their private keys without exchanging their private keys.  It's pretty cool, but hard to explain in one sentence.&lt;/div&gt;</summary>
		<author><name>Jomegat</name></author>
	</entry>
</feed>