Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Учебно-методическое пособие Для студентов, аспи...doc
Скачиваний:
2
Добавлен:
01.05.2025
Размер:
928.77 Кб
Скачать

Vocabulary tasks

Form different parts of speech and translate them.

Cryptography

Give your definitions of the following terms.

Plaintext, encryption, ciphertext, decryption

Make the word combinations.

  1. incompatible a) of tools

  2. communicating b) protection

  3. keyring c) attack

  4. brute d) authentication

  5. integrity e) standards

  6. string f) information

  7. optional g) force

  8. authenticate h) server

  9. man-in-the middle i) of binary

  10. suite j) host

What do the following abbreviations from Text 1 mean?

RSA, IPSec, VPN, SSL

Find abbreviations in Text 2 and comment on their meaning.

Translate into Russian the following paragraph.

Serpent is an AES submission by Ross Anderson, Eli Biham, and Lars Knudsen. Its authors combined the design principles of DES with the recent development of bitslicing techniques to create a very secure and very fast algorithm. While bitslicing is generally used to encrypt multiple blocks in parallel, the designers of Serpent have embraced the technique of bitslicing and incorporated it into the design of the algorithm itself. Serpent uses 128 bit blocks and 256 bit keys. Like DES, Serpent includes an initial and final permutation of no cryptographic significance; these permutations are used to optimize the data before encryption. Serpent was released at the 5th International Workshop on Fast Software Encryption. Serpent 1 resists both linear and differential attacks.

Complete the text by translating Russian phrases given in brackets.

The use of public key cryptography is thus conceptually simple. But two immediate worries may spring to mind. A first concern is that although (1 взломщик, перехватив закодированное послание Эллис) will only see gibberish,the intruder knows both the key (Bob s public key, (2 который доступен всем) and the algorithm that Alice used for encryption. Trudy can thus mount (3 выбранную атаку текста), using the known standardized encryption algorithm and Bob’s publicly available encryption key to encode any message she chooses.Trudy might well try to encode messages, or parts of messages she chooses.Trudy might well try, for example, to encode messages, or parts of messages, that she suspects that Alice might send. Clearly, if public key cryptography is to work, (4 подбор ключа) and encryption/decryption must be done in such a way that it is impossible (or at least so hard to be impossible for all practical purposes) for an intruder to either determine Bob’s private key or somehow otherwise (5 расшифровать или угадать) Alice’s message to Bob. A second concern is that since Bob sencryption key is public, (6 любой может отправить зашифрованное послание Бобу), including Alice or someone claiming to be Alice. In the case of a single shared secret key, the fact that the sender knows the secret key (7 косвенно устанавливает отправителя). In the case of public key cryptography, however, this is no longer the case since anyone can send an encrypted message to Bob using Bob’s publicly available key. Certificates, which we will study later, (8 необходимы для того, чтобы соотнести человека и конкретный открытый ключ).

Translate into English

Хотя существует много алгоритмов и ключей, обладающих этим свойством, алгоритм РСА (названный в честь его разработчиков Р. Райвеста, А.Шамира и Л.Эйдмана) стал практически синонимом криптографических систем с открытым ключом. Рассмотрим сначала, как работает алгоритм РСА. Предположим, Боб хочет отправить зашифрованное сообщение. РСА состоит из двух взаимосвязанных компонентов:

– выбора открытого и закрытого ключа,

– алгоритмa зашифрования и расшифрования.

Translate into English the following paragraph.

DES алгоритм является первым примером широкого производства и внедрения технических средств в область защиты информации. К настоящему времени выпускается несколько десятков устройств аппаратно - программной реализации DES-алгоритма. Для выпуска такого рода устройства необходимо получить сертификат Национального Бюро Стандартов на право реализации продукта, который выдается только после всесторонней проверки по специальным тестирующим процедурам.

Достигнута высокая скорость шифрования. По некоторым сообщениям, в одном из устройств на основе специализированной микросхемы она составляет около 45 Мбит/сек.

Основные области применения DES-алгоритма:

- хранение данных в ЭВМ (шифрование файлов, паролей);

- электронная система платежей (между клиентом и банком);

- электронный обмен коммерческой информацией (между покупателем и продавцом).

Grammar

Past Time. Active and Passive Voice.

Active Voice.

Past Simple.

Употребление. Однократное действие в прошлом.

Образование.

I worked wrote. I did not work write.

He worked wrote. He did not work write.

She worked wrote. She did not work write.

It worked wrote. It did not work write.

We worked wrote. We did not work write.

You worked wrote. You did not work write.

They worked wrote. They did not work write.

Past Continuous.

Употребление. Действие в процессе, совершалось в определенный момент или протекало в течение четко ограниченного периода времени в прошедшем. I was watching TV the whole evening yesterday. Временные показатели: at 5 o’clock yesterday, from 5 till 6 yesterday, the whole evening, when mother came home.

Образование.

I was working. I was not working.

He was working. He was not working.

She was working. She was not working.

It was working. It was not working.

We were working. It was not working.

You were working. You were not working.

They were working. They were not working.

Grammar tasks

Test A. Write the sentences in Past Simple или Past Continuous.

1. He works 10 hours a day.

2. He is thinking of going to Canada.

3. He doesn’t perform this sort of task.

4. He can write a program for you.

5. He doesn’t know what their group is doing.

Test B. Write negative sentences and questions to the sentences of task A.

Test С. Put the verbs in brackets in the correct form, Past Simple or

Past Continuous.

C.E. Shannon (1 develop) a method for symbolic analysis of switching systems and networks in the late 1930-s. He (2 work) at Bell laboratories when he (3 publish) a paper on information theory. He and his IBM colleagues (4 contribute) to the early research in this field. Rochester (5 take part) in the MIT artificial Intelligence Project. When we (6 come), the professor (7 deliver) the lecture.

Passive Voice.

Употребление. Страдательный залог употребляется, когда исполнитель действия неважен или неизвестен. Для говорящего, гораздо важнее описать действие, совершенное над объектом. Эта особенность пассивного залога отражается в построении предложений.

Построение предложений в страдательном залоге. Наибольший интерес представляет объект действия поэтому то, на что направлено действие в страдательном залоге занимает место подлежащего. Исполнитель действия либо не упоминается, либо находится после глагола с предлогом by. Предложения в страдательном залоге строятся по схеме: be+ третья форма глагола в соответствующем времени. Форма глагола be должна соответствовать лицу и числу подлежащего, как показано в примерах.

Past Simple This house was built in 1824.

Этот дом был построен в 1824.

Past Continuous The lecturer was being listened to.

Лектора слушали.

Past Perfect When he come diner had been cooked.

Когда он пришел, обед уже приготовили.

Future-in the Past Perfect (He said that) The letter would have been written by 5 o’clock the next day. Он сказал, что письмо будет написано к пяти часам.

Grammar tasks

Test А. Choose the correct form of Passive Voice.

1. A sound IRM program founds/founded/is founded on a well thought out IRM policy infrastructure.

2. The underlined secure network services installed/was installed/were installed in accordance with the operational documentation.

Test B. Put the verbs in brackets in the correct form of Passive Voice.

1. Uncertainty (measure) inversely with the respect to confidence.

2. This work (finish) next month.

3. The papers of the conference (translate) into 12 languages.

4. Both expected frequency and exposure factor for fire (increase) by not having a fire suppression system.

5. The system (develop) in 1998.

6. Exposure factor (express) as a per cent.

7. Generally accepted Information Security Principles (base) on an Authoritative Foundation of supporting documents and guidelines.

8. It is essential that the process of analyzing and accessing risk (understand) by all sides.

Test C. Put the verbs in brackets in the correct form of Active or Passive Voice.

1. Back in the 90-s, Anti-virus researchers first (fight back) by creating special detection routines designed to catch each polymorphic virus, one by one.

  1. By hand, line by line, they (write) special programs.

  2. W.F.Friedman’s monograph «The index of Coincidence and its Application in Cryptography» (appear) in 1918.

  3. US Army and Navy (work) entirely in secret, when their specialists (begin) making fundamental advances in cryptography.

  4. H.Feistel, who earlier (worked) on identification friend or foe devices for the Air Force, (change) the sphere of his scientific interests.

Communication.

At the customs.

You’re going through the customs. Talk to the customs officer about your trip and luggage.

Writing.

DEPARTMENT OF THE TREASURE

UNITED STATES CUSTOMS SERVICE

CUSTOMS DECLARATION

PRESENT TO THE IMMIGRATION AND CUSTOMS INSPECTORS

EACH ARRIVING TRAVELLER OR HEAD OF A FAMILY MUST WRITE IN THE FOLLOWING INFORMATION. PLEASE PRINT.

1. Family Name Given Name Middle Initial

2. Date of Birth (Mo./Day/Yr)

3. Vessel or Airline & FLT. No

4. Citizen of (country)

5. Resident of (country)

6. Permanent Address

7. Address while in the United States

8. Name and relationship of accompanying family members.

9. Are you or anyone in your party carrying Yes

Any fruits, plants, meats, other plant or

animal products, birds, snails, or other live No

organisms of any kind?

10. Have you or anyone in your party been Yes

on a farm or ranch outside the USA in the

last 30 days? No

11. Are you or any family member carrying Yes

over $ 50000 (or equivalent value in any

currency) in monetary instruments such as

coin, currency, traveler’s checks, money No

orders or negotiable instruments in bearer

form?

12. I certify that I have declared all items

acquired abroad as required here in and that all

oral and written statements which I have made

there are true, correct and complete.

SIGNATURE

NON-CITIZENS ONLY 13. US VISA ISSUED AT (place)

14. Visa Date (Mo./ Day / Yr.)

Additional vocabulary.

  1. Adjustment - совмещение

  2. flexibility – гибкость (применения, оперативность

  3. standard-conforming protocol – протокол стандартного соответствия

  4. bulk data – массив данных

  5. be exploitable into an attack – использоваться для атаки

  6. withstand an attack – противостоять/выдержать атаку

  7. small-ability smartcard – платежная карточка с невысокой платежеспособностью?????????????????????????????????

  8. cipher block chaining - сцепление блоков шифртекста

  9. initialization vector – вектор инициализации

  10. parity bit – бит четности

  11. discard the bytes – исключить байты

  12. random padding – произвольное дополнение незначащей информацией или фиктивными битами, холостое заполнение

  13. elliptic curve cryptography - криптография на основе эллиптических кривых

  14. digital signature - электронно-цифровая подпись

  15. digital signature generation – производство электронно-цифровой подписи

  16. digital signature verification – проверка электронно-цифровой подписи

  17. factorization algorithm - алгоритм разложения на простые множители

Unit 4. Modern Methods of Cryptanalysis.