Search This Blog

Tuesday, September 15, 2009

IF You Know (an insomniac dreams)

occasional night without the moon appear ...
add to the quietness of the silence ...
left heaven to be abused ..

but never sleep without a dream ...
through the eyes of a vain ..
who continue to come, while dancing the song of lonely ...

I'll never know ..
when he came to me ..
through the river and the hill of soul ...
and I also never knew ...
when she went ...
carry the dream of expensive ...
or also I never knew ...
when she flew ...
carried by the wind ... the wind ... and the male beetles

Surabaya,
dawn, October 2007

ECC Cryptography

elliptic curves cryptosystem or shortened by the ECC, is one of the asymmetric cryptographic system that uses the discrete logarithm problem (the discrete logarithm problem). Structure of elliptic curves are used as mathematical operations group to establish a process of encryption and description

In 1985, Neil Koblitz and Victor Miller independently introducing Elliptic Curves Cryptosystem - ECC which uses the discrete logarithm problem at the points elliptic curve called ECDLP (Elliptic Curves Discrete Logarithm Problem). This Criptosystem ellipse curve can be used in any purposes such as:
Scheme encryption (ElGamal ECC)
• Digital Signature (ECDSA - Elliptic Curves Digital Signature)
• key exchange protocol (Diffie Hellman ECC)

Elliptic Curves Cryptosystem using discrete logarithm problem in elliptic curve using elliptic curve groups. Structure of elliptic curves are used as mathematical operations group to establish a process of encryption and description. This method causes difficulties to calculate k given Q and P, where Q = k P.

for example calculate the ECC, awaiting the next blog :)

Analyzing in Text Mining

Text Mining is Mine the data in the form of text. Source of data is usually derived from the documents. The goal is to find words that can represent what is in the document so that it can be inter-connectedness analysis of documents

phase of text mining are:
Tokenism
Filtering
Stemming
Tagging
Analyzing

what is Analyzing ?
Finding how much connection between the words between documents
Term Frequency-Inversed Document Frequency (TF-IDF) is the simplest algorithm is usually used for scoring

the process of TF-IDF

Sunday, September 13, 2009

(Laylat al-Qadr) ليلة القدر


night a thousand months ...

beautiful night
if You promise me Your love
greatest night
if You give Your heart
because my heart and my love
entirely for You, my Love
Sincerely to You, my Heart
entirely for You, O God

tonight and other nights, I'm Yours

History of Cryptography

Cryptography has been used about 40 centuries ago by the people Egypt to send a message to the troops who were on the battlefield and to the message is not readable by the enemy, although the messenger captured by the enemy. Around 400 BC, cryptography was used by the Spartans in the form of a piece of papyrus or parchment covered with a wooden rod. In ancient Roman times, when Julius Caesar wanted to send a message secret to a general on the battlefield. Such messages should be sent by a soldier, but because it contains a secret message, Julius Caesar did not want to open the message in the middle of the road. Here Julius Caesar thinking about how to handle it is to randomize the contents of the message into a message that can not be understood by anyone but can only be Generals understood by all. Of the General had been notified earlier how to read the random messages, having learned key. In the second world war, German enigma machine or also called the rotor machine used by Hitler to send a message to troops on the battlefield. Germans really believe that the message is encrypted use can not be solved enigma.
But the assumption was wrong, after years of study and the allies had cracked the codes it. After the Germans know that the enigma can be solved, then the enigma has experienced several changes. German Enigma used to encrypt a message that has the possibility to be able 15'1018
decrypt the message. some historians believe that the end of World War II due to the Enigma encryption techniques solved.
The development of computer and communication systems in the 60's impact on the demand of certain parties as a means to protect information in digital form and to provide services security. Starting from Feistel of IBM's business in the early 70s and achieving
\ peak in 1977 with the appointment of DES (Data Encryption Standard) as a federal information processing standards of the United States to encrypt information that is not yet classified. DES is a cryptographic mechanism The most known throughout history. The most surprising development in the history of cryptography occurred in 1976 when Diffiel and Hellman published "New Directions in Cryptography". This paper introduces the revolutionary concept of public key cryptography, and also provides a new method for key exchange, security is based on
power discrete logarithm problem. although, Diffiel and Hellman not have practical realization of the idea of public key encryption that time, the idea is very clear and foster a broad interest in the cryptographic community. In 1978 Riv est, Shamir and Adleman discovered the design of public key encryption is now called RSA. Draft RSA factoring problem, based on hard numbers,
and reactivate efforts to find a more efficient method for factoring. 80 years of vast increases in these areas, the RSA system is still safe. Another system is the design of public key found by Taher ElGamal in 1985. This design based on discrete logarithm problem. One of the important contribution of public-key cryptography is a sign digital signatures. In 1991 the first international standard for digital signatures adopted. This standard is based on RSA public key design. In 1994 United States government adopted the Digital Signature Standard, a cryptographic mechanisms based on the ElGamal algorithm.

Crypto Graphia

Cryptography (cryptography) comes from the Greek, composed of two tribes word of "crypto" and "Graphia". "Crypto" means hidden, while "Graphia" means writing. Cryptography is the study of mathematical techniques related to information security aspects, such as data confidentiality, validity of data, data integrity, and authentication data (Menezes, Oorschot and
Van stone, 1996). But not all aspects of information security can be resolved with cryptography. Cryptography can also be defined as the science or art to message security guard. When a message is sent from one place to others, the content of these messages may be intercepted by other parties who are not entitled to know the contents of the message. To keep the message, the message can be converted into a code that can not be understood by other parties.
Encryption is an encryption process to change a codes (messages) from which can be understood (plaintext) into a code that is not understandable (ciphertext). Whereas the reverse process to convert ciphertext be called plaintext decryption. The process of encryption and decryption mechanisms and require a certain key. Cryptanalysis (cryptanalysis) is the opposite of cryptography, which is a science to solve the cryptographic mechanisms in a way to get the key from ciphertext used to get plaintext. Cryptology (cryptology) is a science that includes cryptography and cryptanalysis.
There are four fundamental goals of cryptography is also an aspect security of information, namely
  1. 1. Confidentiality, are aspects related to the maintenance of information content from anyone except those with authority or a secret key to open the encrypted information.
  2. 2. Data integrity, are aspects related to the preservation of the data changes illegally. To maintain the integrity of data, the system must have the ability to detect data manipulation by the parties is not entitled, such as insertion, deletion, and substitutedother data into actual data.
  3. 3. Authentication, are aspects related to identification or recognition, both for inclusion and the information system itself. Two parties communicate with each other to introduce themselves to each other. The information submitted must be authenticated authenticity, data content, time delivery, and others.
  4. 4. Non-repudiation (denial rejected), is an attempt to prevent the denial by sending a sending information, or should be able to prove that a message from someone, when he denied sending such information. (Menezes, Oorschot and Vanstone, 1996).

Saturday, September 12, 2009

Encryption PGP (Pretty Good Privacy)


BASIC THEORY



" PGP" (Pretty Good Privacy) is a type of encryption used for encrypting email. created by Phil Zimmerman . Cryptography is best to use. The software also has some integrated one program, also available in the Linux Operating System environments and Windows. Actually, it's free but there are versions that must be paid.
When you use "PGP" you have to have the data in binary form to be sent. So for email delivery at only design in the form of text. "PGP" also makes an encrypted message in the form of a segment if the file is too large.
Working principle of this algorithm "PGP" is when we apply this algorithm to send a message to our friends, "PGP" keys to make 2 pieces of public key and private key (Example Bob And Alice) and Bob and Alice will exchange their public keys.
When Alice sends Bob an email to the email will be encrypted with Bob's public key and Bob's Private Key, then the email will be sent through the network. If BOB wants to read the email then Bob must have a public key and the Allice key Private own.

dream season

dream season


do not ever express hatred
although the heart would not
because I did not know
since when I love you

let dreams fly
with your shadow
if your body is no longer independent

because the boat display was
cross a ocean of love
and is now anchored in your heart
I did not know why the wave
did not take me sailing again

love is not a honey
but love is the spirit of things
believe me, this season is still beautiful
and I'll stay until flamboyant
must fall, and I imagine
you pick it up .... with a smile
and your beautiful eyes say
"This is my love ......"

Monday, September 7, 2009

The Caesar's Cryptography

Caesar substitution:
Cryptography has been known since Roman times. Was a great king of the Romans at that time whose name was Julius Caesar who introduced the first cryptographic techniques. He used it to hide a secret letter he would send. If the couriers were arrested and the letter fell into the hands of the enemy then the Mush still can not get any information even managed to get a physical letter. Caesar cryptography technique is actually simple, namely by replacing each letter with another letter in the alphabet with the previous agreement. So Cesar and the recipients have made an agreement with a table - tables alphabetically between the original letter by letter instead. Here is an example of cryptographic Caesar.

Example, alphabetical table appointments as follows:

If you want to send a C-section the phrase: "WAR" then the contents of the letter is "DZI". While recipients will return to match sentences in the letter in the table and translated back so he could read the same sentence with what is going to be sent Caesar. While others who do not have the above table can not be read, so that security letter awake. It was said that Caesar's love letter to Cleopatra also uses cryptography so that it can not be known by the senate - the Roman senate who did not like his relationship with Cleopatra.

Cryptography techniques above Caesar substitution technique is also called a cesarean (Substitution Caesar) or substitution techniques. Cryptographic system is to survive long enough, but eventually can be solved. The simplicity of the encoding techniques into the basic technique of substitution is weakness. Enough with the technique Brute Force Attack, or even with just the trial error cryptographic encryption can be solved. By simply knowing what the letters out and then a lot of analysis. For example in the Indonesian language the letter 'A' appears at most, so if the letter is the letter 'Z' appears at most, it can be concluded that the letter 'Z' is a substitute letter 'A'. Once on the next to get a clear information.

What is Cryptography?

Cryptography is the art of encoding information by using specific techniques with the aim of such information can only be known and read by the right side. Cryptography is not merely technical, but also an art. This is because an attempt to break the password is also directly proportional to the effort encrypting, or even more. In its development so that any attacker (person who wants to break the cryptographic code) which called "cryptanalysis" and the cryptographers (principals cryptography) is always locked on each others creativity to each technique.

But the science of cryptography can not be separated from the engineering sciences. Particularly modern cryptography which relies heavily on mathematics. In contrast to the more classical cryptography technique modification of existing data in order not to be recognized. In this book we will be much talk about discrete mathematics which became a mainstay of "ElGamal" cryptography.

Actually there is science in addition to other cryptography to encrypt data that is stenography, which is a data encryption technique with increasing data - other data or abbreviate the data with a specific pattern. Examples of the shorthand is Digital watermarking. Explanation of stenography will be discussed in the chapter on stenography.

Cryptography itself divided by the time period Type 2, namely:

1. Classical cryptography.
2. Modern cryptography.

Meanwhile, if divided by type of cryptographic keys are used, then the cryptography is also divided by 2 is:

1) Symmetric Cryptography
2) asymmetric Cryptography

Cryptography is also divided based on 2 sharing data will be processed, namely:

1. Cryptography Chipper Block
2. Cryptography Stream

Calendar