版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
UnderstandingEncryption
Securityexpertsagreethatcircumspectuseofstrongencryptionisthebestwaytokeepconfidentialdatasecretfrominterloperswhomaystealcomputers,intercepte-mail,orslipthroughcracksinfirewalls.Encryptionisthereal-worldworkhorseofthescienceofcryptography.Itistheprocessofconvertingdataintoaformthatisunintelligiblewithoutthesecretdecryptionkey.
First,let’sgetafewtermsoutoftheway.1Incryptography,afileofanytypethatisn’tencryptediscalledplaintext;encrypteddataiscalledciphertext.Anencryptionalgorithmorcipher,suchasaweakonecalledCaesarCipher,mightreplaceeachcharacterofplaintextbyskippingtwoletterssothatAbecomesD,PbecomesS,ZbecomesC,andsoonthroughoutthealphabet.Thus,plaintextisnowgarbledciphertext.
Ofcourse,thesecurityrenderedbysuchanantiquatedalgorithmisnil.2Modernencryptionalgorithmsarenecessarilymoresophisticatedbecausetheciphertextmayoftenbeprotectinginformationworththousandsormillionsofdollars.3Today’sstrongalgorithms,whichneednotremainsecret,poseamathematicalproblemthatishardtosolvewithoutthecorrectkey.Tocryptographers,“hard”meanscomputingwiththousandsofsystemsandgettingananswerinmonths,years,orsometimesaftertheendoftheuniverse.
Encryptionalgorithmcangenerallybedividedintotwotypes:conventionalalgorithmsandpublic-keyalgorithms.(Thereareothersthathavespecializedfunctions,forinstance,digitalsignatureandkeyagreementalgorithms.)Conventionalalgorithmsaresymmetricalandrelyonthesamekeyforencryptionanddecryption.Theyarebestusedtoencryptfilesonaharddisk.
4Public-keyalgorithms,ontheotherhand,areasymmetrical,usingdifferentkeys,apublickey,andasecretkey,forencryptionanddecryption.Public-keyalgorithmsletyousharefiles,particularlye-mailcorrespondence,withotherusers.Inapublic-keysystem,forinstance,ifZooeywantstosendFrannyanencryptionmessage,FannywouldfirstsendZooeyherpublicKey.ZooeythenusesFranny’spublic-keytoencryptamessagetoher.WhenFrannyreceivesthemessagefromZooey,shecandecryptthemessagewithhersecretkey.
Public-keyencryptionsolvestheproblemofmanagingseveralkeys,butencryptionisslowcomparedtoconventionalencryption.Keymanagementinconventionalencryption,however,isaproblembecauseseveralfilesmaybeencryptedwithdifferentkeys.
Althoughgoodconventionalandpublic-keyalgorithmsarebothconsideredstrong,theirrespectivekeylengthsforsecurityvary.Awhileago,anadhocgroupofcomputerscientistsandcryptographerscontributedtoapaperthatrecommendedakeyofatleast90bitsforsymmetricalgorithmsusedincommercialsecurity.Manydomesticproductsalreadyexceedthatrecommendationandallow128bitkeys,Akeysizeof128bitsmeansthatthereare2128possiblekeys,enoughtofoilabruteforceattack(tryingeverypossiblekey).5Symmetricalgorithmswhosekeysizeis40bitscanbeandhavebeencrackedbyhackers.
Publickeys,however,mustbelarger,becausethemathematicsinanasymmetricalgorithmaredifferent.KeysizesforgoodsecurityusingtheRSApublic-keyalgorithmrangefrom768bitsto2,048bits.6CrackingRSAmeansconfrontingwhatmathematiciansbelievetobethehardproblemoffactoringlargenumbers.NewWordsencryptionn.加密securityn.安全expertn.專(zhuān)家circumspectadj.周到的,周密的confidentialadj.保密的,機(jī)密的interceptv.竊聽(tīng)crackv.破譯firewalln.防火墻workhorsen.骨干cryptographyn.密碼unintelligibleadj.難解的decryptionn.解碼encryptv.將……譯成密碼plaintextn.明文(未加密的電文),明碼文本ciphertextn.加密文本algorithmn.算法cipherv.加密skipv.跳過(guò)garblev.混淆renderv.交付antiquatev.廢棄necessarilyadv.必要地posev.提出cryptographern.破解密碼者digitaladj.數(shù)字的symmetricaladj.對(duì)稱(chēng)的asymmetricaladj.不對(duì)稱(chēng)的correspondencen.一致性,通信decryptv.解密respectiveadj.分別的varyv.使多樣化contributev.貢獻(xiàn)recommendv.推薦exceedv.超過(guò)recommendationn.推薦confrontv.面臨PhrasesandExpressions
sothat以便divideinto把……分開(kāi)forinstance例如ontheotherhand另一方面compareto與……比較TheExplanationofDifficultStatements
1.Incryptograghy,afileofanytypethatisn’tencryptediscalledplaintext.
分析:“thatisn’tencrypted”作定語(yǔ),此處“that”為關(guān)系代詞,故不可以省略。
句意:在密碼學(xué)中,沒(méi)有加密的任何形式的文件都叫做普通文本(也可譯為“明文”)。
2.Modernencryptionalgorithmsarenecessarilymoresophisticatedbecausetheciphertextmayoftenbeprotectinginformationworththousandsormillionsofdollars.
分析:“worththousandsormillionsofdollars”為形容詞短語(yǔ)作定語(yǔ),句型“beworthdoingsth./sb.”意為“值得做某事”。句意:現(xiàn)代加密算法必須更為復(fù)雜,因?yàn)槊艽a文本常為用戶(hù)保護(hù)價(jià)值數(shù)十萬(wàn)或數(shù)百萬(wàn)美元的信息。
3.Today’sstrongalgorithms,whichneednotremainsecret,poseamathematicalproblemthatishardtosolvewithoutthecorrectkey.
分析:“whichneednotremainsecret”和“thatishardtosolvewithoutthecorrectkey”同為定語(yǔ)從句,翻譯時(shí)可采用“分譯法”。句意:今天,強(qiáng)有力的算法無(wú)須保密,因?yàn)樗岢龅臄?shù)學(xué)問(wèn)題在沒(méi)有正確的密鑰情況下是難以解開(kāi)的。
4.Public-keyalgorithms,ontheotherhand,areasymmetrical,usingdifferentkeys,publickey,andasecretkey,forencryptionanddecryption.
分析:“usingdifferentkeys,publickey,andasecretkey,forencryptionanddecryption”為現(xiàn)在分詞作伴隨情況的狀語(yǔ)。句意:公開(kāi)密鑰算法法則是不對(duì)稱(chēng)的,采用不同的密鑰,一個(gè)公開(kāi)的密鑰和一個(gè)秘密的密鑰,用來(lái)加密和解密。
5.Symmetricalgorithmswhosekeysizeis40bitscanbeandhavebeencrackedbyhackers.
分析:“whosekeysizeis40bits”為定語(yǔ)從句,whose在從句中作定語(yǔ)。
句意:密鑰長(zhǎng)度為40位的對(duì)稱(chēng)算法可能并且已經(jīng)被黑客破譯了。
6.CrackingRSAmeansconfrontingwhatmathematiciansbelievetobethehardproblemoffactoringlargenumbers.
分析:“meandoingsth.”的意思是“意味著”、“有……的意思”,“meantodosth.”的意思是“打算做某事”
句意:破譯RSA意味著面臨數(shù)學(xué)家們所認(rèn)為的問(wèn)題——分解大量數(shù)字因子的難題。GrammarTranslationSkills被動(dòng)語(yǔ)態(tài)的翻譯方法
英語(yǔ)中被動(dòng)語(yǔ)態(tài)使用廣泛,尤其是科技作品使用更多,而漢語(yǔ)使用面較窄,因此在翻譯科技作品時(shí),英語(yǔ)被動(dòng)語(yǔ)態(tài)一般翻譯成主動(dòng)語(yǔ)態(tài)。具體有如下翻譯方法。
1.把被動(dòng)句譯成主動(dòng)句
當(dāng)英語(yǔ)被動(dòng)句的主語(yǔ)是無(wú)生命名詞時(shí),常常直譯成漢語(yǔ)的主動(dòng)形式。例如:
Thequalityofthenewproductshasbeengreatlyimproved.這種新產(chǎn)品的質(zhì)量有了很大的提高。
Thisformulahasalreadybeenmentionedabove.這個(gè)公式上面已經(jīng)提到過(guò)。
2.用“將”、“把”、“使”等詞譯成無(wú)主語(yǔ)主動(dòng)句例如:
ThisisdonebyassignaportnumbertoeveryTCPconnection.這是通過(guò)為每個(gè)TCP連接分配一個(gè)端口號(hào)實(shí)現(xiàn)的。
Temperatureischangedquicklyfromroomtemperatureto125℃andisheldthereforatleast15minutes.使溫度很快從室溫升高到125度,并至少保持15分鐘。
3.特別突出被動(dòng)者的譯法要特別突出被動(dòng)者時(shí),把英語(yǔ)的被動(dòng)句譯成漢語(yǔ)的主動(dòng)句,常用“經(jīng)過(guò)”、“由”、“被”、“受”、“讓”、“給”、“靠著”、“遭”、“加以”、“為……所”、“是……的”等詞表示。例如:
Waterisusuallyconsideredasbeingacompoundoftwoelements.水通常被認(rèn)為是由兩種元素構(gòu)成的化合物。
Thequestionwillbeansweredfirst.這個(gè)問(wèn)題總是被首先予以回答。
4.加主動(dòng)者的譯法根據(jù)句意加上“人們”、“我們”、“大家”、“有人”等詞譯成主動(dòng)句。例如:
Hewasseenbuyinganewwashingmachineinthesupermarket.有人看見(jiàn)他在超級(jí)市場(chǎng)買(mǎi)了一臺(tái)新洗衣機(jī)。
Thematterwasveryoftentalkedabout.我們?cè)啻握劦竭@件事。
5.把英語(yǔ)的被動(dòng)句譯成漢語(yǔ)因果句例如:
Thethroatisaffectedbyacold.喉嚨因患風(fēng)寒而痛。
Thecropswerebadlydamagedbyaflood.農(nóng)作物因水災(zāi)而毀壞。
6.主語(yǔ)變賓語(yǔ)的翻譯將原文中的主語(yǔ)在譯文中變?yōu)橘e語(yǔ),譯為漢語(yǔ)主動(dòng)語(yǔ)態(tài)。例如:
Thistaskmustbefulfilledbyusintime.我們必須及時(shí)完成這個(gè)任務(wù)。
7.常見(jiàn)句型的翻譯有些常用句型的翻譯方法需要注意,例如:
Itissaidthat據(jù)說(shuō)
Itisknownthat眾所周知
Itisbelievedthat大家相信
Itisgenerallyagreedthat人們通常認(rèn)為
Itisconsideredthat據(jù)估計(jì),人們認(rèn)為
Itisclaimedthat據(jù)稱(chēng),有人宣稱(chēng)
Itisassumedthat假設(shè),假定
Ithasbeenprovedthat已經(jīng)證明
Itmustbeadmittedthat老實(shí)說(shuō),必須承認(rèn)例如:
Ithasbeenprovedthatenergycannotbedestroyed;itcanonlybechangedintootherforms.已經(jīng)證明,能量是不可能消滅的,只能轉(zhuǎn)換成其它形式。Itisgenerallyrecognizedthatlighthasavastcapacityfortransmittinginformation.一般認(rèn)為,光傳播信息的容量極大。ExercisesⅠ.Fillintheblanksaccordingtothetext:(1)Securityexpertsagreethatcircumspectuseof___________isthebestwaytokeepconfidentialdatasecretfrominterlopers.(2)Incryptography,afileofanytypethatisn’tencryptediscalle______________;encrypteddataiscalled______________.(3)Today’sstrongalgorithms,whichneednotremainsecret,posea__________thatishardtosolvewithoutthecorrectkey.(4)Encryptionalgorithmcangenerallybedividedintotwotypes:______________andpubic-keyalgorithms.(5)______________algorithmsletyousharefiles,particularlye-mailcorrespondence,withotherusers.Ⅱ.Decidewhethereachofthefollowingstatementsistrueorfalseaccordingtothetext:(1)Encryptionistheprocessofconvertingdataintoaformthatisunintelligiblewithoutthesecretdecryptionkey.(2)Modernencryptionalgorithmsarenecessarilymoresophisticatedbecausetheciphertextmayoftenbeprotectinginformationworththousandsormillionsofdollars.(3)Conventionalalgorithmsaresymmetricalandrelyonthedifferentkeyforencryptionanddecryption.(4)Public-keyencryptionsolvestheproblemofmanagingseveralkeys,butencryptionisfastcomparedtoconventionalencryption.(5)Akeysizeof128bitsmeansthatthereare2128possiblekeys,enoughtofoilabrute-forceattack(tryingeverypossiblekey).Ⅲ.TranslatethefollowingsentencesintoChinese:(1)Candidatesarerequiredtopresentthemselves15minutesbeforetheexamination.(2)Attentionshouldbepaidthestudyofminoritynationalities’culture.(3)Itisconsideredofnouselearningatheorywithoutpractice.(4)Althoughgoodconventionalandpublic-keyalgorithmsarebothconsideredstrong,theirrespectivekeylengthsforsecurityvary.(5)WebswitchingisdesignedtoaddresstherequirementsofWebtraffic.Ⅳ.TranslatethefollowingparagraphintoChinese:
Thenumberofbusinesscrimesofalltypesisprobablydecreasingasadirectresultofincreasingautomation.Whenabusinessactivityiscarriedoutwithcomputerandcommunicationssystems,dataarebetterprotectedagainstmodification,destruction,disclosure,misappropriation,misrepresentation,andcontamination.Computersimposeadisciplineoninformationworkersandfacilitateuseofalmostperfectautomatedcontrolsthatwereneverpossiblewhenthesehadtobeappliedbytheworkersthemselvesundermanagementedict.Forexample,acontrolinacomputertodetectalltransactionaboveacertainamountandflagthemforlaterauditworksperfectlyeverytime.Computerhardwareandsoftwaremanufacturesarealsodesigningcomputersystemsandprogramsthataremoreresistanttotampering.ReadingMaterialsComputerCrime(VarietyandExtent)
Computerhavebeenusedformostkindsofcrime,includingfraud,theft,embezzlement,burglary,sabotage,espionage,murder,andforgery,sincethefirstcaseswerereportedin1958.Onestudyof1,500computercrimesestablishedthatmostofthemwerecommittedbytrustedcomputeruserswithinbusinesses—personswiththerequisiteskills,knowledge,access,andresources.Muchofknowncomputercrimehasconsistedofenteringfalsedataintocomputers,whichissimplerandsaferthanthecomplexprocessofwritingaprogramtochangedataalreadyinthecomputer.Withtheadventofpersonalcomputertomanipulateinformationandaccesscomputersbytelephone,increasingnumbersofcrimes—mostlysimplebutcostlyelectronictrespassing,copyrighted-informationpiracy,andvandalism—havebeenperpetratedbycomputerhobbyists,knownas“hackers,”whodisplayahighleveloftechnicalexpertise.Organizedprofessionalcriminalhavebeenattackingandusingcomputersystemsadstheyfindtheiroldactivitiesandenvironmentsbeingautomated.
Therearenovalidstatisticsabouttheextentofcomputercrime.Victimsoftenresistreportingsuspectedcases,becausetheycanlosemorefromembarrassment,lostreputation,litigation,andotherconsequentiallossesthanfromtheactsthemselves.Limitedevidenceindicatesthatthenumberofcomputersinbusinessapplicationswherecrimehastraditionallyoccurred.Thelargestrecordcrimesinvolvinginsurance,banking,productinventories,andsecuritieshaveresultedinlossesoftensofmillionstobillionsofdollars—allfacilitatedbycomputers.NewWordsandExpressions
fraudn.欺騙,欺詐行為embezzlementn.貪污,盜用theftn.偷竊burglaryn.夜盜行為,盜竊sabotagen.(對(duì)財(cái)產(chǎn)等)故意破壞,破壞活動(dòng)espionagen.諜報(bào),間諜活動(dòng)forgeryn.(簽字,文件等)偽造,贗品requisitea.必要的,必不可少的adventn.出現(xiàn),到來(lái)trespassvi.非法入侵piracyn.侵犯版權(quán),海盜行為vandalismn.破壞文化行為,破壞(他人或公共)財(cái)產(chǎn)hobbyistn.有業(yè)余癖好的人Questions(1)WhichkindsofcrimehaveComputerbeenusedfor?(2)Wherehascrimetraditionallyoccurred?ComputerCrime(RemediesandLawEnforcement)
Thenumberofbusinesscrimesofalltypesisprobablydecreasingasadirectresultofincreasingautomation.Whenabusinessactivit
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二五年度網(wǎng)絡(luò)安全應(yīng)急響應(yīng)托管服務(wù)合同2篇
- 二零二五年度綠色建筑評(píng)價(jià)標(biāo)識(shí)工程聯(lián)營(yíng)協(xié)議3篇
- 二零二五年度大貨車(chē)司機(jī)職業(yè)風(fēng)險(xiǎn)防范合同范本3篇
- 網(wǎng)絡(luò)安全文化傳播與防范意識(shí)強(qiáng)化研究
- 2025版實(shí)訓(xùn)基地學(xué)生實(shí)習(xí)就業(yè)安全保障合同2篇
- 小學(xué)教育中的數(shù)學(xué)創(chuàng)新思維培養(yǎng)
- 清遠(yuǎn)廣東清遠(yuǎn)陽(yáng)山縣紀(jì)委監(jiān)委招聘政府購(gòu)買(mǎi)服務(wù)人員筆試歷年參考題庫(kù)附帶答案詳解
- 杭州浙江杭州市湖墅學(xué)校編外教師招聘筆試歷年參考題庫(kù)附帶答案詳解
- 二零二五年度智能家具制造承包合作協(xié)議3篇
- 2025年牛津譯林版選擇性必修1地理下冊(cè)月考試卷
- 幼兒平衡車(chē)訓(xùn)練課程設(shè)計(jì)
- 肩袖損傷的護(hù)理查房課件
- 2023屆北京市順義區(qū)高三二模數(shù)學(xué)試卷
- 公司差旅費(fèi)報(bào)銷(xiāo)單
- 我國(guó)全科醫(yī)生培訓(xùn)模式
- 2021年上海市楊浦區(qū)初三一模語(yǔ)文試卷及參考答案(精校word打印版)
- 八年級(jí)上冊(cè)英語(yǔ)完形填空、閱讀理解100題含參考答案
- 八年級(jí)物理下冊(cè)功率課件
- DBJ51-T 188-2022 預(yù)拌流態(tài)固化土工程應(yīng)用技術(shù)標(biāo)準(zhǔn)
- 《長(zhǎng)津湖》電影賞析PPT
- 銷(xiāo)售禮儀培訓(xùn)PPT
評(píng)論
0/150
提交評(píng)論