08.12

We can compare math encryption and public key. Math encryption is a weak method. Sender sends a message with + a key to receiver. Because the key is in the message, + an intruder can easily steal important information. When we use a public key cryptography, receiver sends a pad lock to sender. Sender uses it to lock a box and sends +it back. Intruder can't unlock the box, because he didn't steal the key. +The Box can be opened only +by the receiver. That’s why a public key cryptography is a strong method of encryption. __The public key is used for encrypting, that is rendering secrets , - the data ** th **at the sender, wishes to send confidentially to the receiver__. Женя, мне это совсем не понятно, переведите, пожалуйста.

"Метод открытого ключа используется для шифрования, то есть оказания секретности данных отправителя, желающего передать (информацию) конфиденциально получателю." Я взял эту фразу из видео, по которому мы составляли схему ответа 1323199361 Я добавила запятые, с ними лучше видно структуру фразы, и ещё Вы совсем чуть-чуть не услышали, но от этого одно подлежащее пропало. 5-

There are 2 types of encryption system: mathematic encryption and public key cryptography. Mathematical encryption relies on such concept as modular arithmetic. Obviously, encryption requires operations that are easy to __perform one way__ [//по-моему грамматически верно//] получается, что речь идёт об одном и том же действии (напр., кодировании), выполняемом только одном способом. [//нееет! я имел в виду, что процесс выполняется только в одну сторону.]// Это было сразу понятно :), только вот говорю же, не поручусь, что это достаточно ясный способ выразить эту мысль, и всем будет понятно.  мне кажется, это не очень удачное выражение, хотя мысль отличная (i.e., encoding), yet nearly impossible to perform the other way (i.e., decoding) without a key.Consider the machanism of sending. __Sender sends a message, that comprises the ciphertext, to receiver__ . это слишком по-русски: придаточное предложение в серединке And encryption key there is in the message. в этом предложении получился обратный порядок слов, поэтому "there" не нужно If an intruder intercepts the message he gets the key and he can decipher the message. Therefore mathematic encription is +a weak and not reliable thing. More safe and reliable type of encryption is the public key. Receiver already has already protected decryption key and previously send sent encryption key to sender. Sender uses this key for making of the ciphertext.Then he sends it. And intruder has not the ghost of a chance to __get open__ имеется в виду? [// я имел в виду cleartext //] text. So, system that uses open key is a strong system. 1323249567 5-

Mathematical encryption is based on the arithmetic and the properties of prime numbers. This is not the strongest method of protection. Strong is the method of public key. This method uses two keys. One key + is used to lock the information, the second key + is used to unlock the information. For example when Artem wants to send a secure message to Lena, he uses __Lena is public key__ непонятно, что Вы хотели написать to encrypt the message. Lena then uses her private key to decrypt it. __For stronger protection use complex combinations of passwords to the hacker took a long time for burglary.__ пожалуйста, переведите это предложение The hacker probably will not break +the code because it takes a lot of time and money. Marat Abrarov
 * Кто сейчас редактирует страницу?! 22.00 **

Now there are math encryption and public key.
====Let's consider the first type of what? . The message with a key sends is sent to receiver. During transfer the intruder can steal the necessary information, because the key is in the message. For this reason, math encryption is considered a n weak method. ==== ==== Now we will consider a the situation when we use public key cryptography. In this case the receiver sends a decryption key to sender. After that, sender uses this key to encrypt the message and sends this text to receiver. The message is protected from intruders, because + it is impossible to read the message without a key it is impossible. It is considered, that public key cryptography is a strong method of encryption. ====

Tsykarev Aleksey 4+

There are 2 types of encryption: mathematical cryptography and public key encryption. Let’s compare them.

Mathematical encryption is weak. Sender dispatches a message to receiver. The message includes the key. So intruder can steal information from the message. And we can say that math encryption often provides only the illusion of protection.

As for public key encryption we can assert that it is strong. In this situation only receiver knows the key. He sends a decryption key to sender and then sender uses this key to encrypt the message and dispatches this encrypted message to receiver. So there is no place for intruder, because he can’t steal information from +the message without a key. 1323273466 5

There are 2 types of encryption: mathematical and public key encryption.

So, what is math encryption? Sender send s the message to receiver. How can we can protect information of this message? The message __keep s __ contains? a unique key which is “traveling” at network with the message and +an open access to information of +the message. It is very insecure. Intruder can steal necessary information because a key is “free-for-all” (общедоступный). __It is weak__. Key?

So, what is public key encryption? It is like math encryption, but only receiver have has access to information, because he have has a key. A key isn't “free-for-all”, and intruder don't doesn't change the m a ssage. It isn't weak, it is strong. Смирнов А.

3 ужас -Оооо... согласен... у меня в буфер не сокпировался исправленный текст,а это старый вариант..( черт( Я, когда быстро набираю, не думаю. Думал что кидаю сюда уже отредактированный текст. Ну ладно, что есть то есть....

There are 2 types of encryption: mathematical encryption and public key.

1) mathematical encryption.

Mathematical encryption is considered an a weak method. Sender sends a message with a key to receiver. Because the key is in the message, an intruder can easily steal information.

2) public key.

When using public key, receiver sends a pad lock to sender and then sender uses this key to encrypt the message and sends this text to receiver. The message +is protected from intruders, it is impossible to read the message without the key.

Казаков О.

5-