
- •Vocabulary
- •Vocabulary tasks
- •I. Choose the correct form of the verb.
- •II. Choose the correct modal verb.
- •III. Choose the correct form.
- •IV. Choose the correct form of the verb in Active or Passive voice.
- •V. Choose the correct preposition.
- •VI. Put an article or an expression of quantity where necessary.
- •VII. Choose the correct form of an adjective or an adverb.
- •I. Put the verbs in the correct form. Present Simple, Present Continuous,
- •II. Put the verbs in the correct form. Past Simple, Past Continuous, Past Perfect, Future – in – the Past.
- •II. Put the articles and the expressions of quantity where necessary.
- •III. Put the adjectives and adverbs in the correct degree of comparison.
- •IV. Put prepositions where necessary.
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Text 2. Symmetric Key Encryption Algorithms. Public Key Algorithms. Cryptographic Hash Algorithms. Read the text and write out the facts that are new for you.
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary and Grammar 1-6. Revision.
- •Put the words in the correct order. The first word is underlined.
- •Match the lines.
- •Put the verbs in brackets in the correct form Active or Passive.
- •Give definitions of the following terms.
- •Translate into Russian.
- •Translate into English.
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Text 2. Virtual private network. Read the text, summarize the ideas and present them orally.
- •[Edit] Authentication mechanism
- •[Edit] Types
- •[Edit] Tunneling
- •[Edit] Security dialogues
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary and Grammar 7-10. Revision.
- •I. Write if the sentences are true or false. Correct the false sentences.
- •Match the lines.
- •Put the verbs in brackets in the correct form.
- •Give definitions of the following terms.
- •Translate into Russian.
- •Translate into English.
- •VI. Translate into English using non-finite forms of the verbs.
- •Appendix 2 Выражения для организации связного высказывания
- •14. Appendix 3 Глоссарий стандартных аббревиатур, терминов и выражений по информационной безопасности
Vocabulary tasks
Give English equivalent of the following Russian words and words combinations.
Неопределенность, передача (информации), возможность, под углом, в определенном направлении, избежать, проходить сквозь что-либо.
Give Russian equivalent of the following English words and words combinations.
Expand, disturb the transmission, over an insecure channel, discrepancy, the parity of subsets, discard, recover the bits.
Form different parts of speech and translate them.
Polar
Make the word combinations.
1. polarization a) channel
2. rectilinear b) of subsets
3. the parity c) bit commitment
4. communication d) on the idea
5. quantum e) channel
6. random f) polarization
7. expand g) code
8. insecure h) filter
9. pre-arranged i) polarization
10. diagonal j) result
Complete the text using the terms and word combinations given below.
An eavesdropper, guarantees, without disturbing, vulnerable, access
It is impossible to obtain information about physical system … it in a random, uncontrollable way. This fundamental quantum-mechanical law … the security of Quantum Key Exchange (QKE) protocols. QKE protocols such as BB84 have been proved to be secure under the assumption that the known laws of physics hold. Given this assumption, QKE is unconditionally secure, i.e. secure even in the presence of … with unlimited computational power.
QKE requires that the parties have … to an authentic channel. Any QKE protocol that does not fulfill this requirement is … to a man-in-the middle attack.
Translate into Russian the following passage.
Quantum Channels.
The single-photon source and the detectors must be connected by a “quantum channel”. Such a channel is not especially quantum, except that it is intended to carry information encoded in individual quantum systems. Here “individual” does not mean “nondecomposible”, but only the opposite of “ensemble”. The idea is that the information is coded in a physical system only once, in contrast to classical communication, in which many photons carry the same information. Note, that the present-day limit for fiber-based classical optical communication is already down to a few tens of photons, although in practice one usually uses many more.
Individual quantum systems are usually two-level systems, called qubits. During their propagation they must be protected from environmental noise. Here “environment” refers to everything outside the degree of freedom used for the encoding, which is not necessarily outside the physical system. If, for example, the information is encoded in the polarization state, then the optical frequencies of the photon are part of the environment. Hence coupling between the polarization and the optical frequency has to be mastered. Moreover, the sender of the qubits should avoid any correlation between the polarization and the spectrum of the photons.
Translate into English the following passage.
1. Квантово-криптографические системы - это побочный продукт разрабатываемого в настоящее время так называемого квантового компьютера.
2. Основная причина бурных исследований в области квантовых компьютеров – это естественный параллелизм квантовых вычислений.
3. Например, если квантовая память состоит из двух кубитов, то мы параллельно работаем со всеми ее возможными состояниями: 00, 01, 10, 11.
4. Бурное развитие квантовых технологий и волоконно-оптических линий связи привело к появлению квантово-криптографических систем.
5. В квантово-криптографическом аппарате применим принцип неопределенности Гейзенберга, согласно которому попытка произвести измерения в квантовой системе вносит в нее нарушения, и полученная в результате такого измерения информация определяется принимаемой стороной как дезинформация.
6. Итак, две конечных цели квантовой (как и классической) криптографии:
1) обеспечить отправителю и адресату защищенный канал обмена информацией;
2) обеспечить механизм проверки секретности такого обмена.
7. Секретным и абсолютно защищенным, в принципе, можно сделать любой канал
передачи информации.
8. Достаточно лишь чтоб обмен шел сообщениями, зашифрованными
криптостойким шифром и качественным секретным ключом.
9. Секретным считаем ключ, известный лишь отправителю и адресату. 10. Качественный ключ - представляет собой абсолютно случайную последовательность 0 и 1.
Additional Vocabulary.
communications channel – канал коммуникации
secure(v) - охранять
expand on an idea – развить мысль
quantum key distribution – распределение квантового ключа
be on the lunatic fringe of cryptography – быть на периферии криптографии
polarization filter - поляризационный фильтр
rectilinear polarization – линейная поляризация
diagonal polarization – диагональная поляризация
over an insecure channel, prearranged code
discrepancy - расхождение
be bugged - быть под тайным наблюдением
discard the bits - отвергнуть биты
parity of subsets - сравнимость подмножеств по модулю