Cryptography has been used about 40 centuries ago by the people Egypt to send a message to the troops who were on the battlefield and to the message is not readable by the enemy, although the messenger captured by the enemy. Around 400 BC, cryptography was used by the Spartans in the form of a piece of papyrus or parchment covered with a wooden rod. In ancient Roman times, when Julius Caesar wanted to send a message secret to a general on the battlefield. Such messages should be sent by a soldier, but because it contains a secret message, Julius Caesar did not want to open the message in the middle of the road. Here Julius Caesar thinking about how to handle it is to randomize the contents of the message into a message that can not be understood by anyone but can only be Generals understood by all. Of the General had been notified earlier how to read the random messages, having learned key. In the second world war, German enigma machine or also called the rotor machine used by Hitler to send a message to troops on the battlefield. Germans really believe that the message is encrypted use can not be solved enigma.
But the assumption was wrong, after years of study and the allies had cracked the codes it. After the Germans know that the enigma can be solved, then the enigma has experienced several changes. German Enigma used to encrypt a message that has the possibility to be able 15'1018
decrypt the message. some historians believe that the end of World War II due to the Enigma encryption techniques solved.
The development of computer and communication systems in the 60's impact on the demand of certain parties as a means to protect information in digital form and to provide services security. Starting from Feistel of IBM's business in the early 70s and achieving
\ peak in 1977 with the appointment of DES (Data Encryption Standard) as a federal information processing standards of the United States to encrypt information that is not yet classified. DES is a cryptographic mechanism The most known throughout history. The most surprising development in the history of cryptography occurred in 1976 when Diffiel and Hellman published "New Directions in Cryptography". This paper introduces the revolutionary concept of public key cryptography, and also provides a new method for key exchange, security is based on
power discrete logarithm problem. although, Diffiel and Hellman not have practical realization of the idea of public key encryption that time, the idea is very clear and foster a broad interest in the cryptographic community. In 1978 Riv est, Shamir and Adleman discovered the design of public key encryption is now called RSA. Draft RSA factoring problem, based on hard numbers,
But the assumption was wrong, after years of study and the allies had cracked the codes it. After the Germans know that the enigma can be solved, then the enigma has experienced several changes. German Enigma used to encrypt a message that has the possibility to be able 15'1018
decrypt the message. some historians believe that the end of World War II due to the Enigma encryption techniques solved.
The development of computer and communication systems in the 60's impact on the demand of certain parties as a means to protect information in digital form and to provide services security. Starting from Feistel of IBM's business in the early 70s and achieving
\ peak in 1977 with the appointment of DES (Data Encryption Standard) as a federal information processing standards of the United States to encrypt information that is not yet classified. DES is a cryptographic mechanism The most known throughout history. The most surprising development in the history of cryptography occurred in 1976 when Diffiel and Hellman published "New Directions in Cryptography". This paper introduces the revolutionary concept of public key cryptography, and also provides a new method for key exchange, security is based on
power discrete logarithm problem. although, Diffiel and Hellman not have practical realization of the idea of public key encryption that time, the idea is very clear and foster a broad interest in the cryptographic community. In 1978 Riv est, Shamir and Adleman discovered the design of public key encryption is now called RSA. Draft RSA factoring problem, based on hard numbers,
and reactivate efforts to find a more efficient method for factoring. 80 years of vast increases in these areas, the RSA system is still safe. Another system is the design of public key found by Taher ElGamal in 1985. This design based on discrete logarithm problem. One of the important contribution of public-key cryptography is a sign digital signatures. In 1991 the first international standard for digital signatures adopted. This standard is based on RSA public key design. In 1994 United States government adopted the Digital Signature Standard, a cryptographic mechanisms based on the ElGamal algorithm.
No comments:
Post a Comment