当前位置:文档之家› 西南交通大学 实用英语翻译 第1章

西南交通大学 实用英语翻译 第1章


19
Can you translate this paragraph?
Perhaps, after seeing quantum computers destroy RSA and DSA and ECDSA, Internet users will leap to the conclusion that cryptography is dead; that there is no hope of scrambling information to make it incomprehensible to, and unforgeable by, attackers; that securely storing and communicating information means using expensive physical shields to prevent attackers from seeing the information—for example, hiding USB sticks inside a locked briefcase chained to a trusted courier's wrist.
(secret sharing )
12
6. 明文/密文 7. 密码分析
(plain-text /Cipher-text ) (cryptanalysis ) (quantum attack) (quantum entanglement) (quantum teleportation)
8. 量子攻击
1. Cryptography
2. Symmetric/Asymmetric encryption 3. Block/Stream cipher
4. Number Theory
5. Finite fields 6. Elliptic curve 7. Digital signature 8. Pseudo-random number
6
teleportation
teleportation
2 classical bits
8
Can you write their full spelling?
1. TSP 2. PKI 3. DSS 4. AES 5. EKE
(Time-Stamp Protocol) (Public Key Infrastructure) (Digital Signature Standard) (Advanced Encryption Standard) (Encrypted Key Exchange)
Thanks For Attendance!
23
German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages
Can you translate this sentence?
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. 信息安全 手段保护信息和信息系统 未经授权 的访问,使用,披露,中断,修改,读取,检 查,记录或破坏。
17
Can you translate this sentence?
信息安全,计算机安全和信息保障术语 往往交替使用。这些领域相互关联,其 共同目标就是保护信息的保密性、完整 性和可用性。
18
Can you translate this sentence?
The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information.
11
Can you say their English spelling?
1. 字典攻击 2. 单向函数 3. 信息隐藏 5. 秘密分享
(dictionary attack) (one-way function ) (information hiding)
4. (量子)密钥分发 ((quantum)Key distribution )
20
也许,在看到量子计算机攻破RSA和ECDSA后, 互联网用户觉得密码学已过时了。他们不再相信 加密信息能抵抗攻击者理解或伪造信息。安全存 储和交流信息意味着使用昂贵的物理屏蔽防止攻 击者看到信息,例如,将USB藏于带锁的公文包 里,并将公文包拴在可信快递员的手上。
将USB藏于可信快递员随身携带的带锁 的公文包里。
10
6. DES
(Data Encryption Standard)
7. NIST (National Institute of Standards and Technology) 8. DoS 9. LAN 10. WAN
(Denial of Service) (Local Area Network) (Wide Area Network)
9. 量子riants of the Enigma machine, used by Germany’s military and civil authorities from the late 1920s through World War II, implemented a complex electro-mechanical polyalphabetic cipher.
5
9. Zero-knowledge proof
10. Identity
11. Certificate 12. Discrete logarithm 13. Authentication 14. Digital watermarking
15. Polynomial-time algorithm
16. Entropy 16. Quantum key distribution 17. Quantum cryptography
21
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances (e.g., improvements in integer factorization algorithms) and faster computing technology require these solutions to be continuously adapted. There exist information-theoretically secure schemes that provably cannot be broken even with unlimited computing power—an example is the onetime pad—but these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.
专业英语翻译
主讲人:罗明星
E-mail:mxluo@
1
?
=
2
Symmetric-key cryptography, where the same key is used both for encryption and decryption
4
Can you understand them?
相关主题