Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Пособие ФИБ 2010 3 курс.doc
Скачиваний:
5
Добавлен:
03.11.2018
Размер:
1.19 Mб
Скачать

5. Answer the questions

What laws of physics is quantum cryptography based on?

Why can't you measure every aspect of a particle at the same time?

How do polarization filters work?

How can the laws of quantum mechanics be used in cryptography?

Does quantum cryptography have practical application? What are the spheres?

6. Mark the following statements true or false. Correct the false statements.

    1. The communication channel can be protected from the eavesdropper by the laws of physics.

    2. No eavesdropper can intercept the transmission protected by quantum cryptography.

    3. All characteristics of particles as studied by quantum mechanics can be easily measured.

    4. Polarization filters let polarized photons pass through the communication channel in any direction.

    5. If we turn the vertically polarized filter 90 degrees the horizontally polarized photons won’t get through.

    6. You can learn the polarization only if you measure it in the basis it is polarized.

    7. If we turn the horizontally polarized filter 90 degrees the vertically polarized photons will get through.

    8. In quantum mechanics particles can change the polarization to get through the filter.

    9. Quantum cryptography is still theoretical.

    10. According to quantum mechanics particles can adapt to the polarization of the filter.

  1. Vocabulary tasks

7. Give English equivalents of the following Russian words and words combinations.

Неопределенность, передача (информации), возможность, под углом, в определенном направлении, избежать, проходить сквозь что-либо.

8. Give Russian equivalents of the following English words and words combinations.

Expand, disturb the transmission, over an insecure channel, discrepancy, the parity of subsets, discard, recover the bits.

  1. Form different parts of speech and translate them.

Polar, secure

  1. Make the word combinations.

    1. polarization

    a) channel

    2. rectilinear

    b) of subsets

    3. the parity

    c) bit commitment

    4. communication

    d) on the idea

    5. quantum

    e) channel

    6. random

    f) polarization

    7. expand

    g) code

    8. insecure

    h) filter

    9. pre-arranged

    i) polarization

    10. diagonal

    j) result

  2. Complete the text using the terms and word combinations given below.

An eavesdropper, guarantees, without disturbing, vulnerable, access

It is impossible to obtain information about physical system … it in a random, uncontrollable way. This fundamental quantum-mechanical law … the security of Quantum Key Exchange (QKE) protocols. QKE protocols such as BB84 have been proved to be secure under the assumption that the known laws of physics hold. Given this assumption, QKE is unconditionally secure, i.e. secure even in the presence of … with unlimited computational power.

QKE requires that the parties have … to an authentic channel. Any QKE protocol that does not fulfill this requirement is … to a man-in-the middle attack.