Encryption is the conversion of data into a form, called a
ciphertext, that cannot be easily understood by unauthorized people.
Two basic types of encryption are commonly used:
1. Symmetric Encryption, where a single secret key is used
for both encryption and decryption.
2. Asymmetric Encryption, where a pair of keys is used one
of Encryption and the other for Decryption.
Some interesting politics surround strong Encryption:
1. strong encryption algorithms are considered to be a
munitions by the United States government.
2. some countries forbid their citizens from using strong
Encryption.
3. strong Encryption algorithms are freely available
everywhere in the world, on the internet.
Encryption excess:
1. Confidentiality of information guaranteed
2. Provide authentication and integrity protection in the checksum algorithm / hash
3. Tackling the phone tapping and email
4. For digital signature
2. Provide authentication and integrity protection in the checksum algorithm / hash
3. Tackling the phone tapping and email
4. For digital signature
Encryption weakness:
1. Improper handling or human error The lack of encryption of data management
2. Deficiencies in the cipher itself
3. Brute force attack
4. Encryption terrorist plot
5. Concealment of a criminal record by a criminal
5. Concealment of a criminal record by a criminal
6. Messages can not be read when the message recipient forgotten or lost keys
Purpose of encryption:
1. Confidentiality: That is to keep the content of information of anyone other than who has the authority or the secret key to unlock the encrypted information.
2. Data Integrity: To maintain the authenticity / integrity of the data, the system must have the ability to detect data manipulation by parties who are not entitled to, such as insertion, deletion, and other data pensubsitusian into the actual data.
3. Authentication: This relates to the identification / recognition, both the unity and the information system itself.
4. Non-repudiasi/Nirpenyangkalan: Is an attempt to prevent denial of shipment / creation of an information by the send / make.

Decryption is the process of converting encrypted data back
into its original form, so it can be understood.
Encryption/decryption is especially important in wireless
communication, because wireless circuits are easier to tap than their
hard-wired counterparts.
Tidak ada komentar:
Posting Komentar