14_03

//Английские термины и выражения можно посмотреть в книжке, глава 2.4, кусочек "Symmetric and Asymmetric Encryption Systems"//
 * Переведите на английский язык.**

Симметричное шифрование Алгоритм симметричного шифрования требует наличия одного ключа для шифрования и дешифрования сообщений. Такой ключ называется общим секретным, поскольку все пользователи, участвующие в обмене данными, имеют один и тот же ключ. Основная проблема, связанная с алгоритмами симметричного шифрования, — необходимость использования секретного ключа. Прежде чем начать зашифрованный диалог, следует убедиться в том, что все участники диалога имеют соответствующий ключ. Этого можно добиться разными способами: выслать ключ по факсу, по почте, прибегнуть к услугам службы курьерской доставки. Но все они достаточно неудобны и имеют свои слабые места. Более надежный, хотя и не лишенный недостатков метод — воспользоваться асимметричным шифрованием для кодирования секретного ключа и выслать его по электронной почте.

Асимметричное шифрование Алгоритм асимметричного шифрования требует использовать один ключ для шифрования данных и другой, но взаимосвязанный с ним ключ — для дешифрования. Один из ключей в такой схеме доступен любому, кто его запрашивает. Такой ключ называется открытым. Другой ключ известен только владельцу и называется личным. Алгоритмы асимметричного шифрования можно применять по прямому назначению (обеспечение конфиденциальности), а также для создания цифровых подписей (аутентификация). Но по своей надежности они не соперники алгоритмам симметричного шифрования. В связи с этим асимметричные алгоритмы чаще всего применяют для шифрования секретных ключей, передаваемых по незащищенным каналам, и для создания цифровых подписей.

Symmetric encryption algorithm requires a single key to encrypt and decrypt messages. This key is called a shared secret key because all the users involved in data exchange have the same key. The main problem of symmetric encryption algorithms is the need to use a secret key. Before beginning the ciphered dialogue,you should make sure that all participants have the key. This can be achieved in different ways: to send the key by fax, by mail, use the courier services. But all of them are not convenient enough and have their weaknesses. A more reliable, though not without weaknesses method - is to use asymmetric enciphering for coding secret key and to send it by e-mail.

Asymmetric encryption algorithm requires the use is a single key to encrypt data and a different key for decryption. One of the keys is accessible for all users. This key is open. The other key is known only to the owner, and is personal. Asymmetric encryption algorithms can be used for their intended purpose (confidentiality) and to create digital signatures (authentication). But the asymmetric encryption algorithms are less reliable than symmetric ones. Therefore, asymmetric algorithms are often used for encrypting the secret key transmitted over unprotected channels, and to create digital signatures. Олег. (работа над ошибками)

Symmetric encryption. Symmetric encryption algorithm needs some the same key for encoding and decoding a m** a **ssages. This key is called “public secret key” because all users __used__ неверно the exchanging of data, have a one key. The main problem of Symmetric encryption algorithms is a [|necessity]  of using a secret key using. Before beginning the encoding encoded dialog +one should be confident in that all dialog members have a correct key. It can be attained by different ways: to send a key by fax, by post, by express [|courier services] . But all ways of __these__ как-то нехорошо are comfortless inconvenient and have weakness es. The more reliable way (method) having some [|negligeable]  weaknesses too, is using asymmetric encryption for secret key coding and send a __gotten__ это какой? key by mail. Asymmetric encryption. Asymmetric encryption algorithm needs using some one key for encoding and an other (associated with +the first one/ it ) key for decoding a m** a **ssage. One of pair keys is free for everyone, who needs it. This key is called “open ed ”. +The Other key is free for +the owner and it’s called “personal”.  Asymmetric encryption algorithm can be used for +its main __assignment__ purpose (ensuring the confidentiality ) and for creating some digital signatures (authentication). But asymmetric algorithms are less safe than symmetric encryption algorithms. Therefore, often asymmetric encryption algorithms are used to encrypt a secrets key posted by unsecure channels and for creating some digital signatures. SmirnovЪ =) 4

Работа над ошибками (Смирнов)

__gotten - имелось ввиду полученный - received. __

Symmetric encryption Symmetric encryption algorithm (SEA) requires one key to encrypt and decrypt the messages. This key +is called a shared secret key, because all users, involving involved in the data exchange, have the same key. запятые не нужны The main problem of SEAs is the need to use a secret key. Before you start an encrypted dialogue, you should make sure that all participants of the dialogue have the appropriate key. You can make it in different ways: send the key by fax, by mail, use [ the ] courier services. But they are quite uncomfortable inconvenient and have some weaknesses. A more reliable method (though with +its own drawbacks) is using of asymmetric encryption to encrypt the secret key and send it by e-mail. Asymmetric encryption Asymmetric encryption algorithm (AEA) requires to use the first one key to encrypt the data and +the second one for decryption, but 1 and 2 keys are interrelated. One of the keys in this scheme is available to anyone who requests it. This is +an open key. Another key is known only to the owner, and it is private. Asymmetric encryption algorithms (AEAs) can be used for its their direct purpose (confidentiality) and to create the digital signatures (authentication). But they (AEAs) are not rivals for SEAs on their reliability. In this regard, AEA are often used to encrypt the secret key transmitted over insecure channels and to create the digital signatures. Danilka) 4 - Danilka немножко ворона, а вот текст замечательно составлен.

Symmetric encryption Symmetric encryption algorithm requires a single key to encrypt and decrypt messages. This It is called a common secret key because +all users communicating data have the same key. The need to use a secret key is the primary problem with symmetric encryption algorithms. Before starting an encrypted dialogue, you should make sure that all participants have +a __known__ неподходящий вариант key. This can be achieved in different ways: the send the key by fax, by mail, use the courier services. But all these ways are uncomfortable and have their weakness es. A more reliable method is to use asymmetric encryption to encrypt the secret key and to send it by e-mail.

Asymmetric encryption This algorithm requires one key for encoding the message and another key for decoding the message(the key for decoding is __related with__ как-то непонятно the key for encoding ). One of these keys is available to anyone who requests it. This key is called “public”. The other key is known only to the owner, and it is called “private key”. Asymmetric encryption algorithms can be used for +their intended purpose (confidentiality) and to create digital signatures (authentication). But the asymmetric encryption algorithms are less reliable than symmetric encryption algorithms. Therefore, asymmetric algorithms are often used to encrypt the secret key(if the key is transmitted over insecure channels), and to create digital signatures.

Aleksey Tsykarev 5- вполне прилично

Symmetric encryption algorithm needs the same key for encoding and decoding messages. This key is known as "__coomon__ common secret key, because all users taking part in data communication use the same key. The main problem of symmetric encryption algorithm is the necessity of using the a secret key using . Before a begin ning of the encoded dialog you should see that all users have the suitable (Это означает просто "подходящий", а не "сторого определённый") required key. There +are !!! two ways +чего? : to send the key by fax or mail or to use the courier services. But They are not comfortable enough and also they have some weaknesses. There is the more reliable method (but it has some weaknesses too) - using asym m etric encryption algorithm for encoding of the secret key and sending this key by e-mail.  Asymmetric encryption algorithm needs [ using ] of one key for encoding of the message and an other key related with the first one for decoding. One of the e se keys is available for all users, who tries !!! try to get access to it. This key is called "open". +The Other key is available only for the owner and it's called "private". You can use asymmetric encryption algorithm for its intended purpose ( it is provision of confidentiallity) or for creating of digital signatures(authentication). But the e se algorithms are less reliable than symmetric encryption algorithm. That's why asymmetric encryption algorithms are often used to for encoding of secret keys, which are sent by unprotected channels and for creating of digital signatures.

user:Kurorisu 4 - - ну, вот ... ((

[]

Symmetric encryption.

Symmetric encryption algorithm use s one key to encrypt and decrypt messages. This key is called a shared secret key, because all users, involved in data exchange, have the same key. запятые не нужно

The main problem of this these algorithms is the need to use a secret key. Before starting an encrypted dialogue, make sure that all participants in the dialogue have the appropriate key. This can be achieved in different ways: sending the key by fax, by post, using a courier services. But all these ways are uncomfortable and have their weakness. A more reliable method — +is using asymmetric encryption to encrypt the secret key and send it by e-mail.

Asymmetric encryption.

Asymmetric encryption algorithm uses 2 keys: the first +one for encryption and the second +one for decryption. One of the keys in this scheme is available to anyone, who requests it. This key is open. Another The other key +is known only to the owner, and is personal.

Asymmetric encryption algorithms can be used for ensuring confidentiality and to create digital signatures (authentication). But they is are less reliable than symmetric encryption algorithms. Because of this, asymmetric algorithms are often used to encrypt the secret key, transmitted over insecure channels, and to create digital signatures.

1331575320 3+ Очень хорошо написано, но ошибки какие дурные! Просто не знаю, что делать. :(

Symmetric algorithms use one key for encryption and decryption. This key is сalled "common secret key" because __participating in data communication users__ have the same key. можно сократить, например: users communicating data have ...  The major difficulty of symmetric algorithms is +the necessity of using the secret key. Before starting encrypted dialogue all participants __have to know the key__. тут слегка не так This can be achieved in different ways: sending the key by fax, by post, using a courier service. But all this these ways are inconvenient and have +their weaknesses. +A More reliable method (but it has some weaknesses too) is using asymmetric algorithm for encrypting the key and sending it by e- mail. Asymmetric encryption algorithm needs 2 __interdependent__ separate keys for encryption and decryption. One key is called "public" because it is accessible for all users. Only +the owner knows the other key which is called "private". Asymmetric encryption algorithms are used for ensuring the confidentiality and for creating digital signatures(authentication). But asymmetric algorithm is less reliable than symmetric +one. So asymmetric algorithms most often are used for encrypting secret keys transferred by __unguarded__ unprotected channels and for creating digital signatures. user:LenaBerezkina

5-

надеюсь, будут ещё варианты :)

Работа над ошибками  Symmetric encryption algorithm needs the same key for encoding and decoding messages. This key is known as "common secret key, because all users taking part in data communication use the same key.  The main problem of symmetric encryption algorithm is the necessity of using a secret key using . Before a beginning of the encoded dialog you should see that all users have the required key. There are two ways to control it : to send the key by fax or mail or to use the courier services. But they are not comfortable enough and also they have some weaknesses. There is the more reliable method (but it has some weaknesses too) - using asymmetric encryption algorithm for encoding the secret key and sending this key by e-mail.  Asymmetric encryption algorithm needs using one key for encoding the message and another key related with the first one for decoding. One of these keys is available for all users, who try to get access to it. This key is called "open". The other key is available only for the owner and it's called "private". You can use asymmetric encryption algorithm for its intended purpose ( it is provision of confidentiallity) or for creating digital signatures(authentication). But these algorithms are less reliable than symmetric encryption algorithm. That's why asymmetric encryption algorithms are often used for encoding secret keys, which are sent by unprotected channels and for creating digital signatures.

user:Kurorisu