《科技英语文献阅读与翻译》Unit 1-TextB

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
the corresponding private key. (para. 3):
In public key cryptography, anything
Alice encodes with Bob’s public key can be decoded by Bob with the matching private key. 译文: 在公钥密码系统里, 艾丽斯用鲍 勃的公钥加密的任何内容都可以被鲍 勃用对应的私钥解密.
10
This means that an eavesdropper, refers to Eve, will not
be able to listen in on their communication. (para. 1):
eavesdropper n. a person who listens secretly to
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 11
Digital signatures are coupled to the electronic document to which they apply. (para. 2):
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 7
digital cash
Digital cash is a digitally signed payment message
that serves as a medium of exchange. Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet. Theoretically, digital cash could be spent in very small increments, such as tenths of a cent (U.S.) or less. Most merchants accept digital cash so far, however, they also use it as an alternative to other forms of payment for somewhat higher price purchases.
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 5
hash function and hash value

Hash Function is an algorithm that transforms a string of characters into a usually shorter value of a fixed length or a key that represents the original value. This is called the hash value. Hash functions are employed in symmetric and asymmetric encryption systems and are used to calculate a fingerprint/imprint of a message or document.
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 13
Encrypting with a private key thus can be regarded as an equivalent to placing one’s signature on the
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 3
public key
It is the key for use with public key encryption
methods that is publicly made available. It is published by the key holder or the issuing certification authority. The certification authority’s directory server can distribute it by disk, web download or e-mail. The public key can be certified using an electronic certificate issued and signed by a certification authority.
Cryptography is the study of mathematical
techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. As the Internet and other forms of electronic communication become more prevalent, electronic security is also becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data.
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 8
source code
Source code is any series of statements written
in some human-readable computer programming language. In modern programming languages, the source code which constitutes a program is usually in several text files, but the same source code may be printed in a book or recorded on tape (usually without a file system). The term is typically used in the context of a particular piece of computer software.
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 12
In public key cryptography, anything Alice encrypts with Bob’s public key can be decrypted by Bob with
v. 1) to link or associate together, connect
eg: Pressure, coupled with nervousness
made it hard for the president candidate to fall asleep. 2) to join as spouses, marry eg: Falling in love at the first sight, they coupled as a perfect match.
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 6
hash function and hash value
When hashing a message, the message is
converted into a short bit string--a hash value-and it is impossible to re-establish the original message from the hash value. A hash value is unique in the sense that two messages cannot result in the same bit string, and any attempt to make changes to the message will negate the value and thus the signature.
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 9
Language Points
2012-7-25
Unit One Text B Digital Signature in Applied Cryptography
2012-7-25 Unit One Text B Digital Signature in Applied Cryptography 4
private key
It is the key for use with asymmetric
encryption that is accessible to the key holder only. Asymmetric encryption uses different keys for encryption and decryption. Each participant is assigned a pair of keys, consisting of an encryption key and a corresponding decryption key. A private key is used for generating digital signatures and for decrypting data.
Unit One
Text B
Digital Signature in Applied Cryptography
Background Information
2012-7-25
Unit One Text B Digital Signature in Applied Cryptography
2
wk.baidu.com
cryptography
private conversation Nowadays many eavesdroppers are able to connect to your personal computer and phone networks. eavesdrop v. listen secretly to private conversation of others A new law has been approved by the congress to allow to eavesdrop on private phone conversations.
相关文档
最新文档