Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
216
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

6. Answer the following questions.

What automated aids to cryptanalysis do you remember? Characterize them in a few words.

What are the approaches to cryptanalysis?

What are the specific feature and potential of AI approach?

What fact is the idea of hill-climbing algorithm based on?

What does avalanche property of DES mean?

What are the tendencies in genetic programming?

Vocabulary tasks

7. Form different parts of speech and translate them.

Verb

Noun

mutation

approach

comprehend

inherit

origin

8. Give as many word combinations as possible and translate them.

Key, solution, cipher.

9. Make the word combinations.

  1. ciphertext-only

a) a DES key

  1. flipped

b) ciphertext

  1. hill climbing

c) aids

  1. trial

d) the process

  1. recover

e) bit results

  1. mimic

f) of discrete elements

  1. incomprehensible

g) solution

  1. chain

h) algorithm

  1. automated

i) group

  1. superencipherment

j) key

10. Complete the text using the terms and word combinations given below.

Running through, a strong encryption algorithm, maps, in parallel, the cryptanalyst, the actual message, computing power

There are several distinct types of cryptoanalytic attack. The type used depends on the type of cipher and how much information ….. has.

Types of cryptoanalytic attacks. A standard cryptoanalytic is to determine the key which … a known plaintext to a known ciphertext. This plaintext can be known because it is standard or because it is guessed. If the plaintext segment is guessed it is unlikelely that its exact position is known however a message is generally short enough for a cryptoanalyst to try all possible positions … . In some systems a known ciphertext-plaintext pair will compromise the entire system however … will be unbreakable under this type of attack.

A brute force attack requires a large amount of … and a large amount of time to run. It consists of trying all possibilities in a logical manner until the correct one is found. Another type of brute force attack is a dictionary attack. This essentially involves … a dictionary of words in the hope that the key (or the plaintext) is one of them. This type of attack is often used to determine passwords since people usually use easy to remember words.

In a ciphertext only attack the cryptanalyst has only the encoded message from which to determine the plaintext, with no knowledge whatsoever of ….

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]