Rabu, 28 Oktober 2009

Tulisan

What is cryptology?
About Cryptology Cryptology is the combination of the science of cryptography and code analysis. Cryptography is a technique for securing the confidentiality of data (confidentiality), the validity of the sender / receiver (authentication), the authenticity of data (integrity) and accountability have been sent / received (nonrepudiation). Code analysis (cryptanalysis, attack) is a technique to solve the cryptographic algorithm. Cryptography algorithms can be categorized into the key algorithms of symmetry, asymmetry and a key hash function. Included is a symmetry key algorithm block ciphers and stream ciphers. Block cipher is an encryption algorithm that has input / output as much as 1 block. Each block is generally composed of 64 bits or 128 bits. Encryption algorithm works to maintain confidentiality (confidentiality) of data. Stream cipher is the encryption algorithm that has input / output 1 bit or 1 characters. Input messages into the encryption algorithm can usually be read, seen and can be understood. This message is called plaintext. Output encryption algorithm called a ciphertext. Ciphertext is always difficult to read or not understood at all. To design a block cipher to note the following things: security vs. speed: The faster usually less secure efficiency of implementation in various software and hardware. Efficiency on a platform sometimes lead to inefficiencies in other platforms. For example, DES has a high speed in hardware but it has a slow speed on the use of software from all the permutations of bits Simplicity. The more complicated algorithms, the more difficult to prove its safety. The ideal, of course, makes the algorithm that seems very complicated for others, but it is very easy for us to prove its safety. The worst possibility is so complicated for us so that we can not prove its safety, but it is very easy for opponents to solve. Should we published encryption algorithm? Sometimes, the algorithm that we hide in the exe file or in the hardware can be reverse-engineering so that others can read. In this case, a secret algorithm into something useless. Easier to just maintain the confidentiality of the key (password) instead of having to maintain the confidentiality of the algorithm as well. It's easier to keep a few secrets than many secrets. Published algorithm can accept a lot of criticism from experts for the repairs. If we have mastered the techniques of world-class algorithm design well, then by maintaining the confidentiality algorithm, the algorithm may be the more secure we are. However, once again keeping the algorithm is not a light task. To keep our algorithm, we must implement it in hardware that will be destroyed so there was an attempt to reverse engineer. When we buy foreign-made device that easily we fill our algorithm implementation, there is no guarantee that the devices we buy will not send the password (key) that we keep inside the device makers, such as RFID technology. There are several types of security that must be observed: Security algorithms Security implementation Physical Security Security organization Security algorithm is how to solve the cryptographic algorithms without regard to its surroundings. Examination technique known as code analysis. Science has not been much in demand in our country, while in many overseas universities and other research institutions, science is considered. So we feel quite say an algorithm is safe to say foreign experts say that. Security implementation is the implementation of the security of cryptographic algorithms. Sometimes we think are able to crack cryptographic algorithms, when what we do is to crack the implementation. Suppose a software tool we can get from the Internet we can obtain the Windows password to others. This is not to crack the algorithm, but to crack the implementation. Another example is through the password version of WEP WiFi security. To crack the implementation is often much easier than to crack the algorithm

Translated By : Roy Darwis Panjaitan

Tidak ada komentar:

Posting Komentar