Помощничек
Главная | Обратная связь


Археология
Архитектура
Астрономия
Аудит
Биология
Ботаника
Бухгалтерский учёт
Войное дело
Генетика
География
Геология
Дизайн
Искусство
История
Кино
Кулинария
Культура
Литература
Математика
Медицина
Металлургия
Мифология
Музыка
Психология
Религия
Спорт
Строительство
Техника
Транспорт
Туризм
Усадьба
Физика
Фотография
Химия
Экология
Электричество
Электроника
Энергетика

I. Put the words in the correct order. The first word is underlined



1. scientists, of, the method, frequency, using, a code, discovered, Arabic, breaking, analysis, by, was

2. process, input, the results, are, of, valuable, the evaluation, to, the accreditation

3. will, evaluation, the CC, between, independent, permit , the results, comparability, of, security

4. began, hackers, in 1990, the government, campaign, to crackdown, nationwide

5. to remain, developments, cryptology, an area, interesting, promises, of

6. by, evaluated, Protection Profile, be, applying, can, the APE criteria

7. aspects, algorithms, combine, secure and fast, hybrid cryptosystems, are, of, and, symmetric, public-key, and

8. any, change, in, does, transposition (or permutation), not, bits, the plaintext

II. Complete the sentences using the words given below.

Block ciphers, require, were hidden, judgments, to recover, inspection, a protocol, certification, jargon code, a set.

1. The certification process is the independent ________ of the results of the evaluation leading to the production of the final certificate or approval.

2. The CC is presented as __________ of distinct but related parts.

3. The evaluation scheme, methodology and __________ processes are the responsibility of evaluation authorities that run evaluation scheme.

4. Many of the evaluation criteria _________ the application of expert judgements and background knowledge for which consistency is more difficult to achieve.

5. The CC contains criteria to be used by evaluators when forming __________ about the conformance of TOEs to the security requirements.

6. In ancient times, messages ____________ on the back of wax writing tables.

7. A method of encryption is only secure if even with this complete access, the eavesdropper is still unable __________ the original plaintext from the ciphertext.

8. Kerberos is ___________ for single sign-on and authenticating users against a central authentication and key distribution server.

9. ___________ like DES are intended to be very hard to break.

10. ___________ , as the name suggests, uses language that is understood by a group of people but is meaningless to others.

III. Match the lines.

1. assurance a) host
2. trial b) analysis
3. covert c) cipher
4. estimate d) text
5. vulnerability e) measures
6. carrier f) encipherment
7. integrity g) aids
8. automated h) protection
9. communicating i) communication
10. null j) the risk

IV. Put the verbs in brackets in the correct form Active or Passive.

1. Back in the 90-s, Anti-virus researchers first (fight back) by creating special detection routines designed to catch each polymorphic virus, one by one.

6. By hand, line by line, they (write) special programs.

7. W.F.Friedman’s monograph «The Index of Coincidence and its Application in Cryptography» (appear) in 1918.

8. US Army and Navy (work) entirely in secret, when their specialists (begin) making fundamental advances in cryptography.

9. H.Feistel, who earlier (work) on identification friend or foe devices for the Air Force, (change) the sphere of his scientific interests.

10. The earliest ciphers (involve) only vowel substitution.

11. French cryptographer of the 16th century B. de Vigenere (produce) a more sophisticated autokey cipher, but for the last 400 years people (attach) his name to a weaker cipher.

12. Ch.Wheatstone (initiate) the usage of electromagnets in electric generators.

13. Codes, in which all combinations (have) identical length, (name) uniform.

14. There are the cases when the information (transfer) not only from onе subscriber to another, but also in the opposite direction.

15. Memory cards (not process) the information.

16. Message-digest algorithms (develop) in 1989 – 1991.

17. The global network Internet (take) a significant place for the last 50 years.

18. The traditional cryptosystems (design) so that they (accept) only identical keys which (use) for encryption and decryption.

19. Cryptographic key (can/hide) within the user’s biometric template.

20. If a photon pulse (measure) in the wrong basis, a random result (get).

V. Give definitions of the following terms.

Availability, hill climbing algorithm, plaintext, optional authentication of the client, reduce risk, semagram, ciphertext-only solution, be a bit off, integrity, access point.

 




Поиск по сайту:

©2015-2020 studopedya.ru Все права принадлежат авторам размещенных материалов.