Terlahir Cantik

All The Best People are Crazy!!

Sunday 23 June 2013

Holiday in Lombok

Hi guys :)
How r u today??
This is a picture of me when I was in Lombok.
The beach is very beautiful. There is no jam. Was cultured. I advise you to visit Lombok. It's a wonderful area in Indonesia. I love my Indonesia ... diverse beauty that is in all countries have ... ** Hugs and kisses to Indonesia...










, ,

Teminology of Cryptography


In cryptography we will often find the terms below, here is the understanding by Rinaldi Munir of his book entitled "Cryptography":


  • The message, plaintext and ciphertext
    Message is data or information that can be read and understood its meaning. Another name for the message is plaintext. So that messages can not be read by anyone other meaning, the message needs to encoded into other forms that can not be understood. Form of encrypted message is ciphertext. Through the opposite process ciphertext can be transformed back into the original plaintext.
  • Sender and Receiver
    Data communication involves the exchange of messages between two entities. Sender is the entity that sent a message to other entities. Recipient is the entity that receives the message. Entities here can be a person, computer or other.
  • Encryption and Decryption
    The process of encrypting plaintext into ciphertext is called encryption. While the process of restoring the original plaintext into ciphertext is called decryption.
  • Cipher and key
    Cipher encryption algorithm also called the rules for enchipering and dechipering or mathematical function used for encryption and descriptions. Modern cryptography uses a key in this algorithm is no longer a secret. Is a key parameter that is used for encryption decryption transformation. Key is usually a string or row of numbers.
  • Cryptography System
    Cryptographic system is composed of a collection of cryptographic algorithms, all possible plaintext and ciphertext and key.
  • Bugs
    Bugs are people trying to get the message during transmission. Tapper goal is to get as much information about the cryptographic system used to communicate with the intent to break the ciphertext.
  • Cryptanalysis and Cryptology
    Cryptanalysis is the science and art to break the ciphertext into plaintext without knowing the key used. The culprit is called cryptanalyst. Cryptology is the study of cryptography and cryptanalysis.

History Of Cryptography


Cryptography has a long history. The use of cryptography beginning of the use of cryptography by the Egyptians 4000 years ago. Historically there are four groups of people who contributed to the development of cryptography, in which they use cryptography to ensure confidentiality of communications important message, namely the military, diplomatic circles, diarist, and lovers (lovers). Among the four groups, the military is the most important contribution because the atmosphere in the messaging war techniques require complex encryption and decryption.

History of cryptography is largely a history of classical cryptography, the encryption method using paper and pencil or perhaps with the help of a simple mechanical device. In general, classical cryptography algorithm is divided into two, namely the algorithm transpose (change the order of the letters in the message) and substitution algorithm (replacing a letter with another letter).

In the 17th century, the history of cryptography noted the victim when the queen of Scotland, Queen Mary beheaded after a secret letter from behind bars that it was a plan to assassinate Queen Elizabeth I successfully solved by a code breaker. In World War II, Nazi German government made ​​a machine called Enigma encryption. But the machine was successfully solved by the allies and the success of this machine is often said to solve sebgai factors that shorten World War II.

Modern cryptography is triggered by the development of the digital computer equipment. With a digital computer, the more complex chipper is very likely to be generated. Unlike classical cryptography to encrypt character by character, modern cryptography and operates on binary strings.

Cryptography

Hi everybody :)

Tonight I will discuss a bit about cryptography. I like cryptography, cryptography is part of Process data security and makes me comfortable in data communications.

Cryptography comes from the Greek meaning cryptos confidential and graphein meaning writing. Cryptography is the science that studies the writing in secret using techniques metematika related to aspects of information security such as: validity, data integrity, and authentication data.

Cryptography destination
There are four fundamental goal of cryptography is the science which is also an aspect of information security, namely:
Confidentiality is a service used to keep the contents of the information of anyone other than who has the authority or the secret key to unlock / peeling the information has been encoded. Data integrity, is associated with preservation of data changes unauthorized. To maintain the integrity of the data, the system must have the ability to detect data manipulation by parties who are not entitled to, such as insertion, deletion, and other data pensubsitusian into the actual data.
Authentication, is related to the identification / recognition, both the unity and the information system itself. The two parties must communicate with each other to introduce themselves. Information transmitted through a channel should be authenticated authenticity, data contents, delivery time, and others.
Non-repudiation, is an attempt to prevent denial of shipment / creation of an information by the transmit / make.

I Love Cryptography :*

Ads Inside Post