Search This Blog

Sunday, September 13, 2009

Crypto Graphia

Cryptography (cryptography) comes from the Greek, composed of two tribes word of "crypto" and "Graphia". "Crypto" means hidden, while "Graphia" means writing. Cryptography is the study of mathematical techniques related to information security aspects, such as data confidentiality, validity of data, data integrity, and authentication data (Menezes, Oorschot and
Van stone, 1996). But not all aspects of information security can be resolved with cryptography. Cryptography can also be defined as the science or art to message security guard. When a message is sent from one place to others, the content of these messages may be intercepted by other parties who are not entitled to know the contents of the message. To keep the message, the message can be converted into a code that can not be understood by other parties.
Encryption is an encryption process to change a codes (messages) from which can be understood (plaintext) into a code that is not understandable (ciphertext). Whereas the reverse process to convert ciphertext be called plaintext decryption. The process of encryption and decryption mechanisms and require a certain key. Cryptanalysis (cryptanalysis) is the opposite of cryptography, which is a science to solve the cryptographic mechanisms in a way to get the key from ciphertext used to get plaintext. Cryptology (cryptology) is a science that includes cryptography and cryptanalysis.
There are four fundamental goals of cryptography is also an aspect security of information, namely
  1. 1. Confidentiality, are aspects related to the maintenance of information content from anyone except those with authority or a secret key to open the encrypted information.
  2. 2. Data integrity, are aspects related to the preservation of the data changes illegally. To maintain the integrity of data, the system must have the ability to detect data manipulation by the parties is not entitled, such as insertion, deletion, and substitutedother data into actual data.
  3. 3. Authentication, are aspects related to identification or recognition, both for inclusion and the information system itself. Two parties communicate with each other to introduce themselves to each other. The information submitted must be authenticated authenticity, data content, time delivery, and others.
  4. 4. Non-repudiation (denial rejected), is an attempt to prevent the denial by sending a sending information, or should be able to prove that a message from someone, when he denied sending such information. (Menezes, Oorschot and Vanstone, 1996).

No comments:

Calendar