Professional Documents
Culture Documents
ПО НАПРАВЛЕНИЮ:
27.03.05 Инноватика
Task 3. What is your opinion of the given text. What extra information can you
give (3-4 sentences)?
Task 6. Convert the following sentences into Passive Voice and translate them
into Russian.
Task 3. What is your opinion of the given text. What extra information can you
give (3-4 sentences)?
Task 4. Convert the following sentences into Passive Voice and translate them
into Russian.
Task 3. What is your opinion of the given text. What extra information can you
give (3-4 sentences)?
a) 1. fall into 2. for instance 3 still 4. whilst 5. strictly speaking 6. such as 7. even
8. highly 9. . including
For centuries, cryptography has been used to keep secrets. In traditional symmetric
single key cryptography, a message (the "plaintext") is transformed using a key,
into another form (the "ciphertext") from which the plaintext cannot be recovered
without knowing the key (or, in reality, from which it is very difficult to recover
the plaintext without knowing the key). Two people who both know the key can
communicate securely even through an insecure channel as long as the key is kept
secret; an attacker intercepting a ciphertext message cannot determine its plaintext
content, lacking the key. Converting a plaintext message into the corresponding
ciphertext is called "encryption". Converting ciphertext into plaintext by use of the
key is "decryption". Converting ciphertext into plaintext without using the key is
part of "cryptanalysis", the science of code-breaking. A related use of cryptography
is the production of modification-detection codes, also known as cryptographic
checksums or cryptographic hashes. A modification-detection code is a small
number (typically between 16 and 128 bits long) which is derived by an algorithm
from a large dataset, in such a way that it is very difficult to find another different
dataset for which the algorithm produces the same small number. One important
use of modification-detection codes, as suggested by the name, is to determine
whether or not a file has changed, without having to maintain a complete copy of
the file for later comparison. By storing only the much smaller modification-
detection code corresponding to the original state of the file, it is possible to verify
(with high probability) that the file is unchanged at a later time, by re-executing the
algorithm and verifying that the result is the same as the stored value. Verifying
that a dataset has not changed is often referred to as verifying the "integrity" of that
data. In recent years, asymmetric cryptographic algorithms have appeared, in
which different keys are used for encryption and decryption, and someone
knowing only the decryption key cannot feasibly determine the encryption key.
This has made digital signature technology possible: if I generate a pair of keys,
keep the encryption key to myself, and reveal the decryption key to the world, I
can now produce a message, encrypt it with the secret encryption key, and publish
it. Others can verify that the message was indeed produced by me (or at least by
someone who knows my secret encryption key), by using the publicly-available
decryption key to decrypt the message. In practice, asymmetric cryptographic
algorithms are very slow, and real digitalsignature systems usually involve
computing a cryptographic hash of the message and encrypting that smaller piece
of data using the asymmetric encryption key; but that is a detail. Let's survey
modern cryptographic algorithms and how they are used in various popular
communication protocols. The best-known asymmetric cryptosystem, used for
both secrecy and digital signing, is probably PGP. As the Net and the Web move
into more central positions in the life of the world, the functions that cryptography
provides (including secrecy, integrity, and digital signatures) become more
important, and cryptographic functions can be found in more places, doing more
things. From e-mail to cellular communications, from secure Web access to digital
cash, cryptography is an essential part of today's information systems.
Cryptography helps provide accountability, fairness, accuracy, and confidentiality.
It can prevent fraud in electronic commerce and assure the validity of financial
transactions. It can prove your identity or protect your anonymity. It can keep
vandals from altering your Web page and prevent industrial competitors from
reading your confidential documents. And in the future, as commerce and
communications continue to move to computer networks, cryptography will
become more and more vital. Cryptographic functions have always been present in
computer systems, but they have usually been relegated to a few obscure utility
programs, function calls, or extra-cost add-ons. We are now starting to see rich
cryptographic functions incorporated into end-user operating systems and widely-
deployed applications. It is obvious, that nowadays power and ubiquity of
cryptography for the battle against computer viruses is increasing. All anti-virus
programs use it, and cryptography plays a great role in the design of present and
future security systems that can help us make our computers resistant to viruses.
But the relationship between cryptography and virus prevention is anything but
simple. Since the beginning of the computer virus problem, people have proposed
solutions involving some form of cryptography; but encryption can also make
virus prevention more difficult, by providing viral hiding places inside the objects
that it protects. So, encryption technology has pluses and minuses.
Task 3. What is your opinion of the given text. What extra information can you
give (3-4 sentences)?
1. The letter announced that the yacht (find) at last. 2. Arthur entered his room to
find that nothing (change) by the family in it since his departure. 3. Today we
(employ) to look at ways of reducing waste. 4. Russell (work) as a software
developer for Microsoft for eight years by now. 5. Many Web sites (offer) software
for converting computer keyboards. 6. The major problem with the QWERTY
keyboard is that it needs to (learn). 7. Acc. to the contract, the body scanners
(update) in two months free of charge. 8. The report said that Lloyd’s phone calls
(intercept) by the police which furthered his arrest. 9. The videos (package) up two
hours ago, ready for distribution. 10. Your computer (deliver) between 9.00 a.m.
and 2.00 p.m tomorrow. 11. The changes (affect) local authorities across the board.
12. The NASA committee (back) off proposals for new landing craft. 13. The
search (provide) the police with several vital clues.
Task 5. Look at the word in brackets following each sentence. Complete each
sentence by the correct form of the words in brackets.
1. Nobody really believed his _______ (explain). 2. There is an enormous
_________ of animals in the Amazon. (vary) 3. The flat was very ______ , with
large rooms and a big balcony. (space) 4. The toxic gases from that factory are
very ______ to plants and wildlife. (harm) 5. He works as a computer _______.
(program) 6. The increase in _______ had created lots of new jobs. (invest) 7.
There is a clear _______ between lawful protest and illegal strike action. (distinct)
8. There is no _______ basis for such policies. (science) 9. A computer has a wide
range of ______ for businesses. (apply) 10. This will provide the information
necessary to examine establishment of the ____ with public sector science. (link)
1. The _____ is really interesting but the pay's lousy. 2. Please write your name,
address, and ______ in the spaces below. 3. The scandal destroyed his ______ as a
politician. 4. He was quite young when he decided he had a religious _______. 5.
Are you in full-time ________ , Mr. Edwards? 6. A big demand for accountants in
the 1980s brought many graduates to enter the _____ . 7. Most of the men had
worked in skilled ______ such as carpentry or printing.