Заглавная страница Избранные статьи Случайная статья Познавательные статьи Новые добавления Обратная связь FAQ Написать работу КАТЕГОРИИ: АрхеологияБиология Генетика География Информатика История Логика Маркетинг Математика Менеджмент Механика Педагогика Религия Социология Технологии Физика Философия Финансы Химия Экология ТОП 10 на сайте Приготовление дезинфицирующих растворов различной концентрацииТехника нижней прямой подачи мяча. Франко-прусская война (причины и последствия) Организация работы процедурного кабинета Смысловое и механическое запоминание, их место и роль в усвоении знаний Коммуникативные барьеры и пути их преодоления Обработка изделий медицинского назначения многократного применения Образцы текста публицистического стиля Четыре типа изменения баланса Задачи с ответами для Всероссийской олимпиады по праву Мы поможем в написании ваших работ! ЗНАЕТЕ ЛИ ВЫ?
Влияние общества на человека
Приготовление дезинфицирующих растворов различной концентрации Практические работы по географии для 6 класса Организация работы процедурного кабинета Изменения в неживой природе осенью Уборка процедурного кабинета Сольфеджио. Все правила по сольфеджио Балочные системы. Определение реакций опор и моментов защемления |
Ex.2.Find English equivalents in the text.Содержание книги
Поиск на нашем сайте
Безопасная коммуникация; на пересечении дисциплин; вычислительно безопасный; требовать раскрытия; шпионаж и подрывная деятельность; открытый ключ шифрования; замена части простого текста; алгоритм шифрования. Ex.3. Match pairs of synonyms in the columns below. 1. prevent 2. recipient 3. additional 4. replace 5. obtain 6. include 7. break 8. concealment 9. infeasible 10. colloquial A. substitute B. impossible C. secretion D. crack E. speaking F. avoid G. extra H. addressee I. gain J. involve Ex.4. Learn the following expressions by heart. To encode a message; to decode a message; to break into the system; to conceal the fact; to convert information; to implement technique; to play important role in; digital media; to require measures; to reverse the process; to write a string of characters; to give the private key to adversary; to enhance security, Ex.5. Make up a sentence with each of the expressions from Ex.4: E.g.To share the information You should not share your sensible information with anyone, even with your friends. Ex.6. Give explanation to the following expressions. Use dictionary, if necessary: e.g. adversary – it’s someone who can do you harm and damage, the person opposite to a friend 1. public key – 2. private key – 3. copyright – 4. symmetric cryptosystem – 5. asymmetric cryptosystem – 6. unintelligible text – 7. steganography– 8. cryptolinguistics– 9. cryptanalysis– 10.RFC 2828 – Ex.7.Answer the questions: 1. What are the objectives of cryptology? 2. What is a computationally secure scheme? 3. What is encryption? 4. What is decryption? 5. What is code in cryptography? 6. What does the abbreviation RSA mean?
Ex. 8. Translate the following text RSA Cryptosystem RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician working for the UK intelligence agency GCHQ, had developed an equivalent system in 1973, but it was not declassified until 1997. A user of RSA creates and then publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime numbers can feasibly decode the message. Breaking RSA encryption is known as the RSA problem; whether it is as hard as the factoring problem remains an open question. RSA is a relatively slow algorithm, and because of this it is less commonly used to directly encrypt user data. More often, RSA passes encrypted shared keys for symmetric key cryptography which in turn can perform bulk encryption-decryption operations at much higher speed. The idea of an asymmetric public-private key cryptosystem is attributed to Whitfield Diffie and Martin Hellman, who published the concept in 1976. They also introduced digital signatures and attempted to apply number theory; their formulation used a shared secret key created from exponentiation of some number, modulo a prime number. However, they left open the problem of realizing a one-way function, possibly because the difficulty of factoring was not well studied at the time. Ron Rivest, Adi Shamir, and Leonard Adleman at MIT made several attempts over the course of a year to create a one-way function that is hard to invert. They tried many approaches including "knapsack-based" and "permutation polynomials". For a time they thought it was impossible for what they wanted to achieve due to contradictory requirements. In April 1977, they spent Passover at the house of a student and drank a good deal of Manischewitz wine before returning to their home at around midnight. Rivest, unable to sleep, lay on the couch with a math textbook and started thinking about their one-way function. He spent the rest of the night formalizing his idea and had much of the paper ready by daybreak. The algorithm is now known as RSA – the initials of their surnames in same order as their paper. Clifford Cocks, an English mathematician who worked for the UK intelligence agency GCHQ, described an equivalent system in an internal document in 1973. However, given the relatively expensive computers needed to implement it at the time, it was mostly considered a curiosity and, as far as is publicly known, was never deployed. His discovery, however, was not revealed until 1997 due to its top-secret classification. Ex. 10. Make a presentation on one of the following topics: History of cryptography: ancient times History of cryptography: modern times Steganography as a field of cryptography Rotor cipher machines in the Second World War RSA cryptosystem: the history of creation The most known cryptosystems of nowadays
Presentation requirements: format – MS Power Point, number of slides – from 10 to 15, animation (optional, but recommended), presentation plan – from 5 to 10 points, performance time from 5 to 7 minutes. Unit 7 Ex.1. Read and translate the text:
|
||||
Последнее изменение этой страницы: 2017-02-17; просмотров: 227; Нарушение авторского права страницы; Мы поможем в написании вашей работы! infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 18.218.123.194 (0.006 с.) |