- •Г. Э. Маркосян,
- •Введение (introduction)
- •Contents
- •From the history of the computer [2]
- •What is a computer? [2]
- •Computers machine [1]
- •Analogue and digital computers [1]
- •The internet [3]
- •Government to rescue it? [1]
- •Modern computer usage for keeping the computer technology history [1]
- •The development of computers in the usa [1]
- •The comparison of the computer development in the usa and the ukrain [1]
- •The homecity of mesm [1]
- •The main fault of the 70-s or the years of “might have been hopes” [1]
- •Protection of information [2]
- •Computer crimes [2]
- •From the history of computer viruses [1]
- •What is a computer virus? [1]
- •Synopsis [1]
- •Computer versus human brain [2]
- •Popular infection methods used by computer viruses [2]
- •The term “computer security” [1]
- •Is your home computer a target? [1]
- •Thinking about your home computer [1]
- •Shadow data (part 1) [1]
- •Shadow data (part 2) [1]
- •How to protect against shadow data security risks [1]
- •Cryptography [1]
- •I. Basic Terminology
- •II. Basic Cryptographic Algorithms
- •Risk assessment [1]
- •Microcomputer and microprocessor [2]
- •Kinds of programs [2]
- •Independent, stored, user, called, the application programs
- •Cobol [4]
- •Technology of automata – based programming introduction [1]
- •Programming languages [2]
- •In order to, from, with, of, for, by, in
- •Memory or storage unit [2]
- •Monitors [2]
- •The mouse [2]
- •Information, machine words, instructions, addresses and reasonable operations [2]
- •From calculi to modern computer [2]
- •Idea, abacus, hand, troublesome, goes back
- •Miniaturization [2]
- •Artificial intelligence [2]
- •News in the computer field [2]
- •Some facts about robots [2]
- •Robotics and robot generations [2]
- •Amd company [4]
- •Dvd technology [4]
- •Dvd video. Dvd discs [4]
- •Pentium I pentium II pentium III [4]
- •Pentium IV [4]
- •Celeron [4]
- •Athlon 64. Opteron [4]
- •Smart stuff [3]
- •Список рекомендуемой литературы
- •Bibliography
- •Автоматизированные системы обработки информации и управления
- •355028, Г. Ставрополь, пр. Кулакова, 2
Cryptography [1]
Task 1. Read and translate the text:
Задание 1. Прочитайте и переведите текст:
Cryptography is ... (более не является) a military thing that should not be messed with. It is time to demystify cryptography and make full use of the advantages it provides for the modern society. In the following, basic terminology and the main methods of cryptography ... (представлены). Any opinions and evaluations presented here are speculative, and the author cannot be held responsible for them.
I. Basic Terminology
Suppose that someone wants to send a message to a receiver, mid wants ... (быть уверенным) that no-one else can read the message. However, ... (существует вероятность) that someone (vise opens the letter or hears the electronic communication. In cryptographic terminology, the message ... (называется) plaintext or cleartext. Encoding the contents of the message in such a way that hides its contents from outsiders is called encryption. The encrypted message is called the ciphertext. The process of retrieving the plaintext from the ciphertext is called decryption. Encryption and decryption usually make use of a key, and the coding method is such that decryption ... (может быть выполнена) only by knowing the proper key.
Cryptography is the art or science of keeping messages secret. Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext ... (без знания) the proper key. People who do cryptography are cryptographers, and practitioners of cryptanalysis are crypt analysts.
Cryptography deals with all aspects of secure messaging, authentication, digital signatures, electronic money, and other applications. Cryptology ... (является отраслью) of mathematics that studies the mathematical foundations of cryptographic methods.
II. Basic Cryptographic Algorithms
A method of encryption and decryption is called a cipher. Some cryptographic methods rely on the secrecy of the algorithms; such algorithms are only of historical interest and are ... (не соответствуют) for real-world needs. All modern algorithms use a key to control encryption and decryption; a message can be decrypted only if the key matches the encryption key. The key used for decryption ... (может отличаться) from the encryption key, but for most algorithms they are the same. There are two classes of key-based algorithms, symmetric (or secret-key) and asymmetric (or public-key) algorithms. The difference is that symmetric algorithms use the same key for encryption and decryption (or the decryption key is easily derived from the encryption key), whereas asymmetric algorithms use a different key for encryption and decryption, and the decryption key cannot be derived from the encryption key.
Symmetric algorithms ... (можно разделить) into stream ciphers and block ciphers. Stream ciphers can encrypt a single bit of plaintext at a time, whereas block ciphers take a number of bits (typically 64 bits in modern ciphers), and encrypt them as a single unit.
Asymmetric ciphers ... (также называемые) public-key algorithms or generally public-key cryptography) permit the encryption key to be public (it can even be published in a newspaper), allowing anyone to encrypt with the key, whereas only the proper recipient (who knows the decryption key) can decrypt the message. The encryption key is also called the public key and the decryption key the private key or secret key.
Modern cryptographic algorithms cannot really be executed by humans. Strong cryptographic algorithms are designed ... (чтобы выполняться) by computers or specialized hardware devices. In most applications, cryptography is done in computer software.
Generally, symmetric algorithms are much faster to execute on a computer than asymmetric ones. In practice they are often ... (используются вместе), so that a public-key algorithm is used to encrypt a randomly generated encryption key, and the random key is used to encrypt the actual message using a symmetric algorithm.
Task 2. Answer the following questions:
Задание 2. Ответьте на следующие вопросы:
What is a cipher?
What are two classes of key-based algorithms?
What are symmetric algorithms?
What are asymmetric algorithms?
What are stream ciphers?
What are block ciphers?
What is the proper recipient?
What is the encryption key?
What is the decryption key?
Task 3. Find the English equivalents in the text:
Задание 3 Просматривая текст, найдите эквиваленты следующих выражений:
более не является; с чем не следовало бы иметь дела; теперь время (настал момент); извлечь все преимущества; любые мнения и оценки являются теоретическими (умозрительными); автор не может считаться ответственным; сохранение секретным; представляют только исторический интерес; не имеют ничего общего с реальными нуждами; одновременно; целый ряд (битов); не могут выполняться человеком; гораздо быстрее; в больших книжных магазинах, библиотеках, патентных бюро и в Интернете; хорошо известный.
Task 4. Say whether the statements given below are true or false:
Задание 4. Определите истинность или ложность следующих предложений:
1. Cryptography is still a military term.
2. In cryptographic terminology, the message is called plaintext or cleartext.
3. The process of retrieving the plaintext from the ciphertext is called decryption.
4. Encryption and decryption usually use a key, and decryption can be done only by knowing the proper key.
5. Cryptography deals only with secure messaging.
6. A message can be decrypted only if the key matches the encryption key.
7. Modern cryptographic algorithms can really be executed by humans.
Task 5. Complete the sentences:
Задание 5. Закончите предложения:
In cryptographic terminology, the message …. .
Encoding the contents of the message ... .
Cryptography is the art or science of ... .
Cryptography deals with all aspects of ... .
All modern algorithms use a key to control …. .
There are two classes of key-based algorithms …. .
The difference is that symmetric whereas asymmetric algorithms use ... , whereas asymmetric algorithms use … .
Modern cryptographic algorithms cannot ... .
LESSON 27