Студопедия
Новини освіти і науки:
МАРК РЕГНЕРУС ДОСЛІДЖЕННЯ: Наскільки відрізняються діти, які виросли в одностатевих союзах


РЕЗОЛЮЦІЯ: Громадського обговорення навчальної програми статевого виховання


ЧОМУ ФОНД ОЛЕНИ ПІНЧУК І МОЗ УКРАЇНИ ПРОПАГУЮТЬ "СЕКСУАЛЬНІ УРОКИ"


ЕКЗИСТЕНЦІЙНО-ПСИХОЛОГІЧНІ ОСНОВИ ПОРУШЕННЯ СТАТЕВОЇ ІДЕНТИЧНОСТІ ПІДЛІТКІВ


Батьківський, громадянський рух в Україні закликає МОН зупинити тотальну сексуалізацію дітей і підлітків


Відкрите звернення Міністру освіти й науки України - Гриневич Лілії Михайлівні


Представництво українського жіноцтва в ООН: низький рівень культури спілкування в соціальних мережах


Гендерна антидискримінаційна експертиза може зробити нас моральними рабами


ЛІВИЙ МАРКСИЗМ У НОВИХ ПІДРУЧНИКАХ ДЛЯ ШКОЛЯРІВ


ВІДКРИТА ЗАЯВА на підтримку позиції Ганни Турчинової та права кожної людини на свободу думки, світогляду та вираження поглядів



Computer Hackers R.I.P.: Making Quantum Cryptography Practical

ScienceDaily (May 2, 2009) — Quantum cryptography, a completely secure means of communication, is much closer to being used practically as researchers from Toshiba and Cambridge University's Cavendish Laboratory have now developed high speed detectors capable of receiving information with much higher key rates, thereby able to receive more information faster.

New research details how quantum communication can be made possible without having to use cryogenic cooling and/or complicated optical setups, making it much more likely to become commercially viable soon.

One of the first practical applications to emerge from advances in the often baffling study of quantum mechanics, quantum cryptography has become the soon-to-be-reached gold standard in secure communications.

Quantum mechanics describes the fundamental nature of matter at the atomic level and offers very intriguing, often counter-intuitive, explanations to help us understand the building blocks that construct the world around us. Quantum cryptography uses the quantum mechanical behaviour of photons, the fundamental particles of light, to enable highly secure transmission of data beyond that achievable by classical encryption.

The photons themselves are used to distribute keys that enable access to encrypted information, such as a confidential video file that, say, a bank wishes to keep completely confidential, which can be sent along practical communication lines, made of fibre optics. Quantum indeterminacy, the quantum mechanics dictum which states that measuring an unknown quantum state will change it, means that the key information cannot be accessed by a third party without corrupting it beyond recovery and therefore making the act of hacking futile.

While other detectors can offer a key rate close to that reported in this journal paper, the present advance only relies on practical components for high speed photon detection, which has previously required either cryogenic cooling or highly technical optical setups, to make quantum key distribution much more user-friendly.

Using an attenuated (weakened) laser as a light source and a compact detector (semiconductor avalanche photodiodes), the researchers have introduced a decoy protocol for guarding against intruder attacks that would confuse with erroneous information all but the sophisticated, compact detector developed by the researchers.

As the researchers write, "With the present advances, we believe quantum key distribution is now practical for realising high band-width information-theoretically secure communication."

Governments, banks and large businesses who fear the leaking of sensitive information will, no doubt, be watching closely.

(based on: http://www.sciencedaily.com)

14. Find English equivalents in the text:

Ключова швидкість, практично здійсненний, незбагненне вивчення, нелогічний, шифрувальна справа, досяжний, волоконна оптика, криогенне охолодження, розповсюджувати ключі, зашифрована інформація, невизначеність, вислів, без можливості відновлення, хакерство, марний, прилад для виявлення, ослаблений лазер, напівпровідникові лавинні фотодіоди, приманка протоколу, витік конфіденційної інформації.

 

15. What words from the text are defined? Choose them from the databank:

Databank:cryogenic, a detector, a setup, encryption, erroneous, quantum mechanics, fibre optics, the leaking of sensitive information, distribution, a protocol.

1) any device that receives a signal or stimulus (as heat or pressure or light or motion etc.) and responds to it in a distinctive manner; 2) of or relating to low temperatures; 3) quantum theory, especially the quantum theory of the structure and behavior of atoms and molecules; 4) the procedures and methods of making and using secret languages, as codes or ciphers; 5) the transmission of information modulated on light carried down very thin flexible fibres of glass; 6) problems of privacy when confidential information is lost or intercepted, lawfully or otherwise; 7) the way something is organized or arranged; 8) a standard procedure for regulating data transmission between computers; 9) containing or derived from error; mistaken; 10) the act of distributing or spreading or apportioning.

 

16. Make up word combinations:

1. to emerge a) against intruder attacks
2. the fundamental nature b) of hacking futile
3. gold standard c) transmission of data
4. to enable highly secure d) with erroneous information
5. to be achievable e) of matter
6. to make the act f) on practical components
7. to offer g) from advances
8. to guard h) by classical encryption
9. to rely i) in secure communications
10. to confuse j) a key rate

 

17. Insert the words in bold type into appropriate places:

(To) adjust – adjustment (s) – adjustable

  1. His hands were making minor______on the deck.
  2. We want them to learn how to take a situation and _____to it.
  3. An _____ keyboard tray is a tool that facilitates the placement of the computer keyboard and mouse.

Читайте також:

  1. A) Computer system engineer / network technician
  2. Advantages of Computer Data Processing.
  3. Advantages of Computer Data Processing.
  4. After an hour or so, Hagrid and Slughorn began making extravagant toasts: to Hogwarts, to Dumbledore, to elf-made wine, and to—
  5. Ancient Steel-Making Secret
  6. Are the electronic media exacerbating illiteracy and making our children stupid? On the contrary, says Colin McCabe, they have the potential to make us truly literate.
  7. B) Read the conversation making sure you stress all the syllables printed in block letters.
  8. Before you read the text below say how conference participants can use computers for preliminary information exchange.
  9. Buying a computer
  10. CAN HUMANS REMAIN IN CONTROL OF COMPUTERS?
  11. Careers in Computer Science
  12. Computer animation




Переглядів: 405

<== попередня сторінка | наступна сторінка ==>
Robots To Clean Your Kitchen And Play A Game Of Hockey? | Encrypted – (to) encrypt – encryption – decryption

Не знайшли потрібну інформацію? Скористайтесь пошуком google:

  

© studopedia.com.ua При використанні або копіюванні матеріалів пряме посилання на сайт обов'язкове.


Генерація сторінки за: 0.003 сек.