Computer Science. The English Language Perspective - Беликова (1176925), страница 30
Текст из файла (страница 30)
Also storing the template in a centralized databasepaves for attack and compromise. On the other hand, storingthe template on a smart card enhances individual privacy andincreased protection from attack, because individual userscontrol their own templates. Vendors enhance security byplacing more biometric functions directly on the smart card.Some vendors like Biometric Associates, have built a fingerprintsensor directly into the smart card reader, which in turn passesthe biometric to the smart card for verification.PKI uses public- and private-key cryptography for useridentification and authentication.
It has some advantages over176biometrics as it is mathematically more secure and it can beused across the Internet. The main drawback of PKI is themanagement of the user's private key. To be secure, the privatekey must be protected from compromise and to be useful, theprivate key must be portable. The solution is to store the privatekey on a smart card and protect it with biometric. There areproposals for integrating biometrics, smart cards and PKItechnology for designing Smart Access common government IDcards.Notes:PIN(PersonalIdentification Number) –личныйопознавательный номер, аналог пароля.EyeTicket – программное обеспечение для распознаванияпассажира по радужной оболочке глаза.Smart card – пластиковая карта со встроенноймикросхемой, контролирующей устройство и доступ кобъектам памяти.Common Biometric Exchange File Format – единый форматпредставления биометрических данных.Point-of-Sales system – программно-аппаратный комплекс,функционирующий на базе фискального регистратора.
Засистемой закреплен типичный набор кассовых функций.PKI (Public Key Infrustructure) – инфраструктура открытыхключей. Набор средств, распределенных служб икомпонентов, используемых для поддержки криптозадачна основе открытого и закрытого ключей.ID (Identifier) – идентификатор, уникальный признакобъекта, позволяющий отличать его от других объектов.Assignments1.
Translate the sentences from the texts into Russian inwriting paying attention to the underlined words andphrases:1771. Common physical biometrics include fingerprints, handor palm geometry, retina, iris, and facial characteristics.Behavioral characters characteristics include signature,voice, keystroke pattern, and gait.2. There are a variety of approaches to fingerprintverification, such as traditional police method, usingpattern-matching devices, and things like moire fringepatterns and ultrasonics. This seems to be a very goodchoice for in-house systems.3.
Accuracy can be very high if desired, and flexibleperformancetuningandconfigurationcanaccommodate a wide range of applications.4. A retina-based biometric involves analyzing the layer ofblood vessels situated at the back of the eye. Thistechnique involves using a low intensity light sourcethrough an optical coupler to scan the unique patternsof the retina.5. An iris-based biometric involves analyzing featuresfound in the colored ring of tissue that surrounds thepupil.6. Voice authentication is based on voice-to-printauthentication, where complex technology transformsvoice into text.7. There are several promising prototype biometricapplications.
One of them, EyeTicket, links a passenger'sfrequent-flyer number to an iris scan.8. Point-of-sales (POS) system vendors are working on thecardholder verification method, which would enlistsmart cards and biometrics to replace signatureverification.9. Some vendors like Biometric Associates, have built afingerprint sensor directly into the smart card reader,which in turn passes the biometric to the smart card forverification.1782.
Answer the following questions:1. What is the goal of biometrics?2. Why is biometrics the most secure means of security?3. What are biometric technologies? Characterize them inbrief.4. How can biometrics be used for secure network andcomputer access?5. Why does storing a user's biometrics templates present aproblem?3. Translate into English:На данный момент системы распознавания поотпечаткампальцевзанимаютболееполовиныбиометрического рынка.
Множество российских изарубежных компаний занимаются производством системуправлениядоступом,основанныхнаметодедактилоскопической идентификации. По причине того,что это направление является одним из самых давнишних,оно получило наибольшее распространение и является насегодняшний день самым разработанным. Сканерыотпечатков пальцев прошли действительно длинный путь кулучшению. Современные системы оснащены различнымидатчиками (температуры, силы нажатия и т.п.), которыеповышают степень защиты от подделок.
С каждым днемсистемы становятся все более удобными и компактными.По сути, разработчики достигли уже некоего предела вданной области, и развивать метод дальше некуда. Крометого, большинство компаний производят готовые системы,которыеоснащенывсемнеобходимым,включаяпрограммное обеспечение. Интеграторам в этой областипростонетнеобходимостисобиратьсистемусамостоятельно, так как это невыгодно и займет большевремени и сил, чем купить готовую и уже недорогую приэтом систему, тем более выбор будет действительно широк.1794. Give the summary of the text using the key terms.Topics for essays (you might need additional information):An overview of possible threats and attacks.Technical trends affecting software security.Security goals.Preventive measures are the key point in the provisionof software security.Identity theft.180CRYPTOGRAPHY AND DATA ENCRYPTIONTERMINOLOGYRead the following words and word combinations and usethem for understanding and translation of the text:thereof - соответственноthorough - тщательныйundecipherable code — код, не поддающийсярасшифровкеforgery – подделкаcipher - шифрto derive from ...
– происходить из...Cryptography and encryption have been used for securecommunication for thousands of years.Throughout history, military communication has had thegreatest influence on encryption and the advancements thereof.The need for secure commercial and private communication hasbeen led by the Information Age, which began in the 1980s.Although the Internet had been invented in the late 1960s, it didnot gain a public face until the World Wide Web was inventedin 1989.
This new method of information exchange has caused atremendous need for information security. A thoroughunderstanding of cryptography and encryption will helppeople develop better ways to protect valuable information astechnology becomes faster and more efficient.Cryptography is the science or study of techniques of secretwriting and message hiding. Cryptography constitutes anymethod in which someone attempts to hide a message, or themeaning thereof, in some medium.Encryption is one specific element of cryptography in whichone hides data or information by transforming it into anundecipherable code. Encryption typically uses a specifiedparameter or key to perform the data transformation. Some181encryption algorithms require the key to be the same length asthe message to be encoded, yet other encryption algorithms canoperate on much smaller keys relative to the message.Decryption is often classified along with encryption as itsopposite.
Decryption of encrypted data results in the originaldata.Encryption is used in everyday modern life. Encryption is mostused among transactions over insecure channels ofcommunication, such as the Internet. Encryption is also used toprotect data being transferred between devices such asautomatic teller machines (ATMs), mobile telephones, andmany more. Encryption can be used to create digital signatures,which allow a message to be authenticated.
When properlyimplemented, a digital signature gives the recipient of amessage reason to believe the message was sent by the claimedsender. Digital signatures are very useful when sendingsensitive email and other types of digital communication. Thisis relatively equivalent to traditional handwritten signatures, inthat, a more complex signature carries a more complex methodof forgery.A cipher is an algorithm, process, or method for performingencryption and decryption. A cipher has a set of well-definedsteps that can be followed to encrypt and decrypt messages.The operation of a cipher usually depends largely on the use ofan encryption key. The key may be any auxiliary informationadded to the cipher to produce certain outputs.Plaintext and ciphertext are typically opposites of each other.Plaintext is any information before it has been encrypted.Ciphertext is the output information of an encryption cipher.Many encryption systems carry many layers of encryption, inwhich the ciphertext output becomes the plaintext input toanother encryption layer.
The process of decryption takesciphertext and transforms it back into the original plaintext.In efforts to remain secure, governments have employed stafffor studying encryption and the breaking thereof.Cryptanalysis is the procedures, processes, and methods used182to translate or interpret secret writings or communication ascodes and ciphers for which the key is unknown.Even though the goal has been the same, the methods andtechniques of cryptanalysis have changed drastically throughtime.
These changes derive from an attempt to adapt to theincreasing complexity of cryptography. Due to the tremendousadvantage of knowing the enemy's thoughts, war is the maindriving force of cryptanalysis. Throughout history manygovernments have employed divisions solely for cryptanalysisduring war time. Within the last century, governments haveemployed permanent divisions for this purpose.Notes:ATM (Automatic Teller Machine) – банкоматAssignments1.
Translate the sentences from the text into Russian inwriting paying attention to the underlined words andphrases:1. Throughout history, military communication has hadthe greatest influence on encryption and theadvancements thereof.2. Although the Internet had been invented in the late1960s, it did not gain a public face until the World WideWeb was invented in 1989.3. A thorough understanding of cryptography andencryption will help people develop better ways toprotect valuable information as technology becomesfaster and more efficient.1834. Cryptography constitutes any method in whichsomeone attempts to hide a message, or the meaningthereof, in some medium.5.