Understanding Panda Language and Example Problems

Definition of Panda Language and Examples of Problems – Panda language may still sound foreign to the public’s ears. However, recently, the term panda language has gone viral. This is because the panda language appears in the Computer-Based Writing Examination in 2020.

The test takers at that time complained about the emergence of this panda language problem. The questions that appear are in the form of rows of irregular letters like a code that must be solved. whereas, the curriculum in Indonesia itself does not include panda language in it. This also means that panda language is not learned in school.

Panda language may still be a confusing thing for the next UTBK participants. Maybe they answer more origin or skip the question. In fact, this panda language is actually not too complicated if you know the logic.

Panda language is indeed part of the science of cryptography. Cryptography is a science that combines mathematics and art in order to prevent data leakage. The article below will explain the panda language further.

Definition of Panda Language

Panda language is a term that originated from research from Chinese scientists who studied panda animals. Pandas are mammals similar to bears that have black and white fur and come from the country of the bamboo curtain.

Scientists there are always trying to preserve these animals from extinction, one of which is by studying the panda language they use to communicate every day.

In 2015, scientists in China found that there is a distinct pattern when pandas communicate. For example, when pandas feel hungry they make a “gee-gee” sound, when they are sad they make an “ow-ow” sound, when they are happy they say “coo-coo”.

Starting from this research, the term panda language emerged. This unique language is involved when there are questions about languages ‚Äč‚Äčthat are like ciphers.

Panda language is part of the science of cryptography. Cryptography is a term that comes from Greek. Consists of the word Kryptos which means hidden and graphein which means to write. So it can be concluded that Cryptography is a writing process that aims to convey secret or hidden messages.
In terms of digital technology, cryptography is a science that studies encryption techniques that are randomly arranged by using encryption keys, so that text turns into writing that is difficult to read by users who do not have a decryption key.

History of Cryptography

Before entering modern times, cryptography was only seen as a secret message, a message that could not be read by eavesdroppers. Encryption is used to ensure confidentiality, including techniques to check the integrity of a message, sender and recipient identities, digital signatures, computational proof of security and so on.

This early form of runic writing required little implementation of writing, because in ancient times many people could not read.

The initial type of classic cipher is the transposition cipher, the cipher begins where it sets the order of the letters in the message, or randomizes the order of the letters, for example ‘good morning’ becomes ‘esmatal apig’. Transposition ciphers work on ciphers in which you systematically replace letters or words with other words. This word substitution was originally called Caesar cipher, where each word was replaced by the same number of letters.

The Greeks in Classical times are said to have known ciphers. For example, the scytale transposition code which is claimed to have been used by the Spartan military. Steganography, that is, hiding the existence of a message to maintain its secrecy. Steganography is a cipher that was first developed in ancient times.

An early example, from Herodotus, is a message tattooed on a slave’s shaved head and hidden under growing hair. More modern examples of steganography include the use of invisible ink, microdots, and digital watermarks to hide information.

Basically all ciphers remained susceptible to cryptanalysis using frequency analysis techniques until the development of the polyalphabetic cipher, by Leon Battista Alberti around 1467. Although there are some indications that it was already known to Al-Kindi. Alberti’s innovation was to use different ciphers that is, substitutional alphabets for different parts of the message.

He also invented what may have been the first fully automated ciphering device, a wheel that implemented some of the realizations of his invention. In the Vigenère cipher, a polyalphabetic cipher, the encryption uses a password, which controls substitution of letters depending on which letters of the password are used. In the mid-19th century, Charles Babbage showed that the Vigenere cipher was vulnerable to Kasiski examination.

Prior to the early 20th century, cryptography was originally concerned with linguistic and lexicographical patterns. Since then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of information theory, computational complexity, statistics, combinatorics, abstract algebra, and number theory.

Cryptography is also a branch of engineering, as it deals with active, intelligent and malicious opposition. While other types of engineering, for example, civil or chemical engineering only need to deal with neutral forces of nature.

Types of Cryptography

Cryptography is divided into several types based on their use. Here are the types:

1. Hash Functions

The Hash Function is used to summarize data and send summarized explanations. This type of cryptography uses mathematical equations. The algorithm will take a numeric value and make it as input, then summarized by a system called the hash system.

If the user uses a hash function, then the user does not need a key, because the hash function has been adapted to the stages of a one-way based data transmission scenario.

The term “hash” offers a natural analogy with a non-technical meaning, considering how hash functions scramble their input data to customize their output. In his research for the exact origin of the term, Donald Knuth notes that Hans Peter Luhn of IBM appears to have been the first to use the hash function concept in a memo recorded in January 1953.

2. Public Key Cryptography

Public Key Cryptography, or asymmetric cryptography, is a cryptographic system that uses key pairs. Each pair consists of a public key that others may know and a private key that may not be known to anyone but the owner.

The generation of the key pair depends on a cryptographic algorithm based on a mathematical problem called a one-way function. Effective security requires secrecy of the private key whereas the public key can be distributed openly.

In such a system, anyone can encrypt a message using the intended recipient’s public key, but the encrypted message can only be decrypted with the recipient’s private key.

This allows, for example, a server program to generate a cryptographic key designated for the corresponding symmetric key cryptography, then use the public key that is openly shared by the client to encrypt the newly generated symmetric key.

Then the server can send this encrypted symmetric key through an insecure channel to the client. Only the client can decrypt it using the client’s private key paired with the public key used by the server to encrypt the message.

With the client and server both having the same symmetric key, they can safely use symmetric key encryption to communicate over an unsecured channel. This scheme has the advantage of not having to manually share the previous symmetric key.

Prior to the mid-1970s, all cipher systems used a symmetric key algorithm, in which the same cryptographic key was used with the underlying algorithm by the sender and receiver, who both had to keep it private.

By necessity, keys in any such system must be exchanged between communicating parties in a secure manner prior to use of any system.

3. Symmetric Key Cryptography

Symmetric Key Cryptography is an algorithm for cryptography that uses the same cryptographic key for plaintext encryption and ciphertext decryption. The keys may be identical, or there may be a simple transformation between the two keys.

Each key represents a secret shared between two or more parties that can be used to maintain private information links. The requirement that both parties have access to the secret key is one of the main drawbacks of this type of cryptography, compared to public key cryptography.

The symmetric key algorithm requires that the message sender and receiver have the same secret key. All early cryptographic systems required that the sender or receiver somehow receive a copy of the secret key via a physically secure channel.

Almost all modern cryptographic systems still use this type of cryptography. Internally to encrypt most messages, they eliminate the need for a physically secure channel by using a Diffie–Hellman key exchange or some other public key protocol to reach a secure agreement .

Panda Language Questions and Discussion

1. If WE are worth 41, and YOU are worth 46, then I have a value…

a. 33
b. 34c
. 35d
. 36

2. If J = 4, then YOGVG CGQOR VXKYOJKT VKXZGSG OTJUTKYOG

a. YUKQGXTU
b. YUKNGXZU
c. NGZZG
d. NGHOHOK

3. It is known that H = 12, then DASWJ ZE XWSWD EJE UWJC PANIWOQG DAVFMRKNW

a. IWYWJ
b. XQWUW
c. OWLE
d. QHWN

4. In certain codes, the translation of the following codes is known.

147: A FLOWER IS BEAUTIFUL
273: JASMINE IS WHITE
724: JASMINE IS BEAUTIFUL
The numbers 7 and 2 are the code for the word

a. interest and it
b. beautiful and white
c. jasmine and it
d. flowers and jasmine

5. If MALAPETAKA can be written AAEAA and PERMAISURI can be written EAIUI, then EDUCATION can be written

a. EIIA
b. EAA
c. AAEI
d. UEIE

6. S = 6, then FVNCN XRGHN ZVPEFBSG

a. OVYY TNGRF
b. WRSS ORMBF
c. ZRYVAQN
d. ZBEX

7. In certain coding languages, NICE is encoded as 57421 and the word ONCE is encoded as 136798. then the word BASI is encoded as..

a. 1457b
. 4216c
. 9873d
. 5718

Discussion

1. Convert each letter to a number according to the alphabetical order. A = 1 B = 2, and so on. after that count.

WE = 11 + 9 + 20 + 1 = 41
YOU = 11 + 1 + 13 + 21 = 46
I = 1 + 11 + 21 = 33
So the correct answer is A.

2. the clue J = 4 states that J must be replaced with the 4th letter, replacing the letter D. So J – D, K – E, L – F, M – G, N – H, and so on. From the sentence YOGVG CGQOR VXKYOJKT VKXZGSG OTJUTKYOG it says that Who was Indonesia’s first vice president, then the answer is B, namely HATTA.

3. It is known that H = 12, then DASWJ ZE XWSWD EJE UWJC PANIWOQG DAVFMRKNW…

Just like the previous method, the letter H is changed to the 12th letter, meaning H – L, I – M, J – N, K – O, L – P and so on. From the sentence DASWJ ZE XWSWD EJE UWJC PANIWOQG DAVFMRKNW it is found that THE BELOW ANIMALS ARE HERBIVORS, the correct answer is C, OWLE which means COW.

4. From the information provided, the following information is obtained:

147: THE FLOWER IS BEAUTIFUL
273: JASMINE IS WHITE
724: JASMINE IS BEAUTIFUL

7: that 1: flower 4: beautiful 2: jasmine 3: white

the number 7 is called three times, just like the word, so 7 is it.
the number 2 appears twice, like the word jasmine, then 2 is jasmine.
the number 3 appears once, meaning 3 is white.
number 1 appears once, meaning 1 is interest.
the number 4 appearing twice means 4 is beautiful.
So, numbers 7 and 2 are codes for ITU and JASMINE.

5. It is known that MALAPETAKA can be written AAEAA and PERMAISURI can be written EAIUI, so EDUCATION can be written..

take the vowel found in the word, MALAPETAKA, the vowel is AEAAA.
PERMAISURI has the vowel EAIUI. EDUCATION has the vowel EIIA. so the correct answer is A.

6. It is known that S = 6, then FVNCN XRGHN ZVPEFBSG

see the following table.
Once known, FVNCN XRGHN ZVPEFBSG is WHO THE CHAIRMAN OF MICROSOFT, then the correct answer is OVYY TNGRF, namely BILL GATES.

7. It is known that in certain code languages, GOOD is encoded as 57421 and the word ONCE is encoded as 136798. then the word BASI is encoded as..

Each letter represents a number code, B – 5, A – 7, G – 4, U – 2, S – 1 and S – 1 E – 3, K – 6, A – 7, L – 9, and I – 8 . then you can get the word BASI which has the code 5718. The correct answer is D.

Tips for Working on Panda Language Problems

Panda Language Problems do not require difficult formulas such as doing math or physics problems. If necessary, make notes on the order of the letters of the alphabet, starting from A as order 1 to Z as order 26. Then change the alphabet according to the question.

When working on Panda language questions, what is needed is caution and thoroughness, because seen directly, the difficulty level of Panda language questions is not as difficult as math or physics problems.

In addition, try to practice working on panda language questions of various types. You can also practice Panda language by exchanging messages with your friends using the Panda language code.

Actually, this Panda language question is not a new type of question, in general, Panda language questions are often found in police or service exams. In fact, there are several panda language questions that require participants to translate their language into numbers first.

Panda language questions have different levels of difficulty, panda language questions only require you to think faster and more carefully in reading patterns. So the first thing you should do is decipher the strange language in the problem, and quickly look for patterns.

The way to see the pattern is to look at the same words that appear and have different meanings. In these strange words there are usually the same sub-words, so from there we can find the meaning of the word.

when working on panda language problems, actually you don’t need to fully translate this strange language. You just simply do the method by eliminating answers. Apart from looking at the panda language questions, you also have to research the answer choices, so you don’t need to stick to strange words in the questions, and eliminate answers that you think are not quite right.