关注微信领¥50

百门课程¥0元


50万+已关注

科学美国人60秒:光子芯片增加智能手机加密力度-下载

2016-11-18 15:40:53来源:网络

点击查看>>科学美国人60秒音频:光子芯片增加智能手机加密力度

  科学美国人60秒中英文翻译:光子芯片增加智能手机加密力度

  科学美国人60秒英文文本

  This is Scientific American — 60-Second Science. I'm Christopher Intagliata.

  Got a minute?

  Today's cars have loads of computer smarts built in. Like the chips that allow you, with the push of a button to unlock your car. And as new cars move down the assembly line, automakers program those functions into the car.

  "They produce one car and they program a cryptographic secret in it, in order to secure it against thieves." Timo Kasper, a cryptographer and engineer at the security and IT consulting company Kasper & Oswald. "Then comes the next car on the production line and they put the same secrets into the second car. And then comes the third car on the production line and they again put the same secrets into this car. And they repeat this process for millions of cars in the world. And now millions of cars in the world share the same cryptographic secret. Of course, this secret is not so well protected anymore, because it's in every of these million cars, and in every remote control. And this is of course a typical example of how to not do it."

  汽车遥控装置.jpg

  And yet, he says that's exactly how the Volkswagen Group did do it, for many cars manufactured in the last 20 years. Kasper and his colleagues decoded that shared cryptographic secret by studying the design and operation of chips from VW Group cars and remotes. After hacking the hardware, they were easily able to eavesdrop on and decrypt unlocking signals, clone the remote control and unlock cars. They presented the details August 12th at the USENIX Security Symposium, in Austin, Texas.

  Kasper says VW is aware of the problem—and they're not alone. "This is not a VW bug but this is a red line, as we Germans say, through all the automotive industry." In fact, in the same study, they showed that another encryption system used by many other brands, including Ford, Chevy, Nissan and Mitsubishi, has a weak cryptographic algorithm—which, again, allowed the team to break into more than a dozen cars.

  Bottom line? It's easier to hack into cars than many drivers might have imagined. So if you want to avoid eavesdropping, the researchers recommend simply ditching remote controls and cryptography, and just go back to the good old metal key.

  Thanks for the minute for Scientific American — 60-Second Science Science. I'm Christopher Intagliata.

  中文翻译请点击下一页

为你特别匹配的托福超值课程,快速提分先人一步!
  • 【留学TED】丢掉困扰,留学生活就该丰富多彩

    丢掉困扰,留学生活就该丰富多彩

    适合人群:留学党

    课时:1小时

    查看详情
  • 阅读营 – 扫清托福阅读长难句4大障碍

    阅读营 – 扫清托福阅读长难句4大障碍

    适合人群:备考托福阅读,攻克长难句的考生!

    课时:4小时

    查看详情
  • 1小时讲透托福(第2季:重难点解析)

    1小时讲透托福(第2季:重难点解析)

    适合人群:托福备考小白

    课时:4小时

    查看详情
  • 【活动价】新东方托福名师在线一对一(体验课)

    【活动价】新东方托福名师在线一对一(体验课)

    适合人群:想体验新东方在线致赢托福1对1辅导冲分课程的同学

    体验课时:30分钟

    查看详情
  • "美国大学直达号”系列公开课

    课程特点:留学考试专家与17位申请规划大咖带你直达梦校

    课时:8小时

    查看详情
全部课程>>
单项突破
直播课堂

更多托福课程
新东方25年教学经验沉淀
托福考生必修课
托福考生,高效提分,安心之选

查看详情>>
更多>>
更多课程>>
更多>>
更多内容
更多>>

TOEFL 20天扫清托福阅读长难句4大障碍

4天直播技巧讲解16天社群打卡学习

每周一小时直播,半小时答疑,4天12句长难句练习讲解,助你搞定托福长难句。 活动日期 : 2018.09.27-2018.10.31

价格 : ¥免费

675人 已报名

查看详情
更多>>
更多公开课>>
更多>>
更多课程>>