Помощничек
Главная | Обратная связь


Археология
Архитектура
Астрономия
Аудит
Биология
Ботаника
Бухгалтерский учёт
Войное дело
Генетика
География
Геология
Дизайн
Искусство
История
Кино
Кулинария
Культура
Литература
Математика
Медицина
Металлургия
Мифология
Музыка
Психология
Религия
Спорт
Строительство
Техника
Транспорт
Туризм
Усадьба
Физика
Фотография
Химия
Экология
Электричество
Электроника
Энергетика

Grammar. Passive Voice. See Grammar reference



Task А. Choose the correct form of Passive Voice.

1. The assumed threats to security specify/ specified/are specified below.

2. The unauthorized disclosure has been prevented/has prevented/has being prevented.

4. The repeatable key based/is based/bases on the following principles.

5. Knowing about the risk, one is prepares/prepared/is prepared better to protect information.

6. A sound IRM program founds/founded/is founded on a well thought out IRM policy infrastructure.

7. An event, the occurrence of which could have an undesirable impact, is defined/define/ defines as threat.

8. Nowadays real-time operating system is employed/are employed/were employed in consumer devices.

9. The underlined secure network services installed/was installed/were installed in accordance with the operational documentation.

Task B. Put the verbs in brackets in the correct form of Passive Voice.

1. Uncertainty (measure) inversely with the respect to confidence.

2. The papers of the conference (translate) into 12 languages.

3. Both expected frequency and exposure factor for fire (increase) by not having a fire suppression system.

4. Exposure factor (express) as a percent.

5. Generally accepted Information Security Principles (base) on an Authoritative Foundation of supporting documents and guidelines.

6. It is essential that the process of analyzing and assessing risk (understand) by all sides.

7. It (discover) that 1024 bits is not enough for an RSA key.

8. The program (develop) for about three months before some mistakes (find) in it.

9. New tools for solving this problem (design) now.

10. By the end of the term the students (master) new technicues.

Task C. Put the verbs in brackets in the correct form, Active or Passive Voice.

1. The curves (show) in figure 4.

2. Our analysis (suggest) the spheres of practical application of our technique.

3. Our ongoing work (focus) on the use of other biometric measurements.

4. If the BUSINESS module (choose) this can (use) to generate a detailed questionnaire appropriate to the system under review.

5. W.F.Friedman’s monograph «The Index of Coincidence and its Application in Cryptography» (appear) in 1918.

6. These systems (share) an unmatched reputation for operating 24 hours a day, 365 a year, nonstop.

7. Back in the 90-s, Anti-virus researchers first (fight back) by creating special detection routines designed to catch each polymorphic virus, one by one.

8. By hand, line by line, they (write) special programs.

9. US Army and Navy (work) entirely in secret, when their specialists (begin) making fundamental advances in cryptography.

10. H.Feistel, who earlier (work) on identification friend or foe devices for the Air Force, (change) the sphere of his scientific interests.

Communication.

Prepare a report and take part in the discussion on the topic “New and Novel Cryptographic Algorithms”.

Questions for discussion.

Which ideas made the greatest contribution to the development of cryptography (present them in chronological order)?

What are the most famous cryptographic algorithms?

What do you know about their developers?

Which facts from the history of cryptography impressed you most of all?

Unit 4. MODERN METHODS OF CRYPTANALYSIS.

Pronunciation

Make sure you pronounce the following words properly:

incomprehensible [ɪnˌkɔmprɪ'hensəbl] drudgery ['drʌdʒərɪ]
cipher ['saɪfə] avalanche ['ævəlɑ:nʃ]
altitude ['æltɪtju:d] precede [prɪ'si:d]
finite ['faɪnaɪt] genetic [dʒɪ'netɪk]
mimic ['mɪmɪk] quantitative ['kwɔntɪtətɪv]
endure [ɪn'djuə] mutate [mju:'teɪt]
subtle ['sʌtl] duplicate ['djuɪplɪkət]
trial ['traɪəl] inheritance [ɪn'herɪtəns]

 

Memorize the terms

1. Read the following terms and their definitions and memorize them:

avalanche property of DES - changing a single bit in a DES key results in every bit of the enciphered block being changed randomly after only a few rounds

ciphertext-only solution – process of decryption when cryptanalyst has only encrypted text to recover the plaintext

endure – bear, stand, suffer, sustain

flaw – disadvantage, demerit, weak point in the system

incomprehensible ciphertext – encrypted message that is impossible to read and understand

mimic the process – imitate, simulate the process

overlapping superencipherment groups – partial matching of encrypted messages

remove one bit of drudgery – simplify monotonous work

subtle – delicate, gentle, hardly seen

 




Поиск по сайту:

©2015-2020 studopedya.ru Все права принадлежат авторам размещенных материалов.