Using Strategies and Word Patterns: The Code Book – Flashcards
Unlock all answers in this set
Unlock answersquestion
Relating a difficult text to a personal experience can help readers ____ their reading.
answer
connect to
question
Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice.
One way to better connect with this excerpt is to
answer
tell about an experience with a computer virus.
question
Although traffic analysis, tempest attacks, viruses and Trojan horses are all useful techniques for gathering information, cryptanalysts realize that their real goal is to find a way of cracking the RSA cipher, the cornerstone of modern encryption.The RSA cipher is used to protect the most important military, diplomatic, commercial and criminal communications—exactly the messages that intelligence gathering organizations want to decipher. If they are to challenge strong RSA encryption, cryptanalysts will need to make a major theoretical or technological breakthrough.
What is the central idea of this paragraph?
answer
Breaking RSA code is the greatest challenge for cryptanalysts.
question
One of the author's purposes in The Code Book is to explain different types of codebreaking to his readers. Which line best demonstrates this purpose?
answer
a more recent development is the so-called tempest attack, which aims to detect the electromagnetic signals emitted . . . in a computer's display unit
question
Cryptanalysts realize that their real goal is to find a way of cracking the RSA cipher, the cornerstone of modern encryption . . .
Use the meaning of the underlined words above to understand the sentence.
David's family was puzzled by the short and cryptic note he left on the table.
What does cryptic mean?
answer
mysterious
question
A reader can ask, "How would I react if the events in this book happened to me?" to put a text into
answer
context.
question
A more recent development is the so-called tempest attack, which aims to detect the electromagnetic signals emitted by the electronics in a computer's display unit.
Which two words share a prefix?
answer
electromagnetic; electronics
question
Despite the enormous strength of RSA and other modern ciphers, cryptanalysts are still able to play a valuable role in intelligence gathering. Their success is demonstrated by the fact that cryptanalysts are in greater demand than ever before—the NSA is still the world's largest employer of mathematicians.
What is the central idea of this paragraph
answer
Skilled people are still important national security workers.
question
Jac is reading this paragraph from The Code Book.
Mathematicians have been studying factoring for centuries, and modern factoring techniques are not significantly better than ancient techniques. Indeed, it could be that the laws of mathematics forbid the existence of a significant shortcut for factoring.
Which question will best help Jac apply the reading to his own life?
answer
What is important for me to understand?
question
If Eve parks a van outside Alice's house, she can use sensitive tempest equipment to identify each individual keystroke that Alice makes on her computer. This would allow Eve to intercept the message as it is typed into the computer, before it is encrypted. To defend against tempest attacks, companies are already supplying shielding material that can be used to line the walls of a room to prevent the escape of electromagnetic signals.
In this excerpt, the author explains
answer
how computer security can be broken.