Search This Blog

Thursday, August 13, 2009

Ensuring Security Cryptography

In this world there are some parties who want to take information from chipertext already in cryptography. party called kriptanalis.
Kriptoanalisis also be defined as art or science to solve ciphertext become plaintexts using the midst security a cryptography system. This makes Kriptoanalisis labeled as illegal ways to translate ciphertext. Based on the activities of attackers, the attack that occurred can be divided into two types, namely:

a) passive attacks, where attack is attacker only monitors the channel communication. Passive attacker only threaten confidentiality of data.

b) active attacks, where attack is
attacker trying to remove, add, or in a way that another change in the transmission path of communication. Active attacker will threaten data integrity and authentication, and confidentiality.


Types of Seizures
There are several types of attacks that can be done by kriptoanalis, with the assumption that kriptoanalis had cryptography algorithm used in the system that will be attacked, namely:

1. Ciphertext Only Attack
'Kriptoanalis' only have a few ciphertext a result of tapping. But he does not know the key and the plaintext. Employment 'kriptoanalis' is seeking to obtain the decryption key the plaintext.

2. Known Plaintext Attack
Kriptoanalis successfully obtain discount
the plaintext and a full the chipertext, but he believes that both are interconnected. For example, the snippet plaintext which is believed to be a letter, because there is the phrase "respect us." 'Kriptoanalis' then try to match the chipertext that have meaning "respect us." Next task is to find a little of the decryption key information that he had it.

3. Candy Plaintext Attack
"Kriptoanalis" not only know a plaintext and the chipertext as in the case 2 above, but also free to choose some plaintext considered in accordance with a certain part of ciphertext. "Kriptoanalis" next task is to a key of guess.

4. Adaptive Candy Plaintext Attack. This attack is a special case of third type of attack mentioned above. "Kriptoanalis" not can only select a the plaintext would be encrypted, but can also modify choice based on the results of previous encryption. In Candy the plaintext attack, it may only can select a block for large plainteks encrypted, while he is on the attack can block plaintext choose a smaller and then select the other based on the results previously.

5. Candy Ciphertext Attack
"Kriptoanalis" can choose which ciphertext different decryption and to have access against plaintext encrypted. As example, "kriptoanalis" have access to the box
electronic process that can perform decryption automatically. Employment is "kriptoanalis" find the decryption key.

6. Candy Text
Candy is a combination of plaintext attack Candy and ciphertext attack. Here "kriptoanalis" already know the encryption algorithm ciphertext used and that will be read. "Kriptoanalis" can also select the plaintext would be cipherteks encrypted with spouse raised with a particular secret key.

Conditions that ensure security algorithms

There are 3 conditions that, when fulfilled by the algorithm cryptography, it will be able to guarantee security confidential communication made, namely:

1. If the cost to attack or penetrate cryptography algorithms that are used more than the price information will be obtained from results of these attacks. For example, the required computer system is worth 1 billion to penetrate algorithm that is used to protect information is worth 500 million.

2. When the time needed to penetrate algorithm is longer than the validation who wish to obtain information. For example, the time to penetrate a credit card is 1 years, whereas before the 1 year credit card is no longer valid.

3. When cipherteks produced by a cryptography algorithm less than cipherteks required to penetrate algorithm it. For example, of 1000 bits is required cipherteks to hit the key that is used on an algorithm, while the data resulting from the size of the encryption process is less of 1000 bits.

2 comments:

Unknown said...

This article covers so many new and unique facts about cryptography which I wasn't aware of. I am glad that I found such a useful post and its my pleasure to give comment.
e signatures

Icank said...

thank you in advance for reading my article,I just Try My best.. :)

Calendar