All The Best People are Crazy!!

Sunday 23 June 2013

Teminology of Cryptography


In cryptography we will often find the terms below, here is the understanding by Rinaldi Munir of his book entitled "Cryptography":


  • The message, plaintext and ciphertext
    Message is data or information that can be read and understood its meaning. Another name for the message is plaintext. So that messages can not be read by anyone other meaning, the message needs to encoded into other forms that can not be understood. Form of encrypted message is ciphertext. Through the opposite process ciphertext can be transformed back into the original plaintext.
  • Sender and Receiver
    Data communication involves the exchange of messages between two entities. Sender is the entity that sent a message to other entities. Recipient is the entity that receives the message. Entities here can be a person, computer or other.
  • Encryption and Decryption
    The process of encrypting plaintext into ciphertext is called encryption. While the process of restoring the original plaintext into ciphertext is called decryption.
  • Cipher and key
    Cipher encryption algorithm also called the rules for enchipering and dechipering or mathematical function used for encryption and descriptions. Modern cryptography uses a key in this algorithm is no longer a secret. Is a key parameter that is used for encryption decryption transformation. Key is usually a string or row of numbers.
  • Cryptography System
    Cryptographic system is composed of a collection of cryptographic algorithms, all possible plaintext and ciphertext and key.
  • Bugs
    Bugs are people trying to get the message during transmission. Tapper goal is to get as much information about the cryptographic system used to communicate with the intent to break the ciphertext.
  • Cryptanalysis and Cryptology
    Cryptanalysis is the science and art to break the ciphertext into plaintext without knowing the key used. The culprit is called cryptanalyst. Cryptology is the study of cryptography and cryptanalysis.

No comments:

Post a Comment

Ads Inside Post