My blog audience

Diberdayakan oleh Blogger.
RSS

Shift Code (Classical Algorithm Criptography)

Code substitution technique sliding (shift) with a modulus of 26 to give numbers to every alphabet such as A <> 0, b <> 1 ... .... Z <> 25. To be more clear, consider the example below:


 
Text-Original: "We Will Meet at Mid Night"
The above sentence gets the numbers from each letter as follows:
22 4 22 8 11 11 12 4 4 19 0 19 12 8 3 13 8 6 7 19

To get the text-code, we have a lock 11. By adding saetiap-value of the original text with the key 11 is obtained:
7 15 7 19 22 22 23 15 15 4 11 4 23 19 14 24 19 17 18 4

If more than 20, when coupled with the key then will be reduced by 26.
For example, 22 +11 = 33-26 = 7. Once converted into the letter, it will get the text-code:

"HPHTWWXPPELEXTOYTRSE"

Text-Original: We meet at will from mid night
Text-code: HPHTWWXPPELEXTOYTRSE
Key: 11

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Classical Cryptography Algorithms (& Caesar Code)

Cryptography has been used since four centuries ago. The development of cryptography is so fast until now. To get a sense of how a cryptographic algorithm developed, following the explanation below will browse one at a classical algorithm, the technique of substitution and transposition techniques.

Classical cryptography has several characteristics: 
  1. Based Character, 
  2. Using pen and paper only, no computer, 
  3. included into the key cryptography symmetry.

Three reasons for studying the classical cryptography: 
  1. Understand the basic concepts of cryptography. 
  2. Modern basic algorithm. 
  3. Understand the weaknesses of the system code.

Substitution Technique
Substitution is the replacement of each character-original text with other characters.



There are four terms of code, among others:
  • Monoalphabet: Every character-coded text characters replace one of the original text.
  • Polyalphabet: Every character-coded text to replace more than one kind of character-the original text.
  • Monograph: The encryption performed on the original single-character text.
  • Polygraph: The encryption performed on more than one character-the original text.


Caesar Code
Substitution of the first in the world of encryption (coding) occurred during the rule of Julius Caesar, known as Emperor's code, using the initial letters of the alphabet position or also called ROT3 algorithm.
Caesar Cipher (ROT3)


In more detail, consider the following example:


Be:


If the shift is performed three times then the key for decryption is 3. Shift key by sending a message depends on the will. It could be the key that is used a = 7, b = 9, and so on.

Sample code algorithm Cesar: For the original text-provided symbol "P" and the text-code "C" and key "K". So the formula can be made as follows:
C = E (P) = (P + K) mod (26)

In the example above, we can put the key with a value of three so that it becomes:

C = E (P) = (P +3) mod (26)

Decryption formula like the following:

P = D (C) = (C-K) mod (26)

From the example above, by entering a key three, then:
P = D (C) = (C-3) mod (26)

If given the original text as follows:

Jika diberikan teks-asli sebagai berikut:

GEMPA YOGYA MENELAN KORBAN TIDAK SEDIKIT DAN SAMPAI SEKARANG MASIH MENYISAKAN TRAUMA BAGI ORANG-ORANG KOTA GUDEG
Dengan menggunakan kunci tiga, maka akan didapat teks-kode berikut:
JHPDBRJBDPHQHODQNRUEDQWLGDNVHGLNLWGDQVDPSDLVHNDUDQJPNHDUDQJPHQBLVDNDQWUDPDEDJLRUDQJRUDQJNRWDJXGHJ

Code Emperor resolved by brute force attact, a form of attacks carried out by trial and error to find the key possibilities. Can also use the exhaustive key search, because the number of keys is very small (only have 26 keys). Although few, key a bit tedious code kriptanalis (people who break the code), because to find it by brute force attact it takes a long time.

There are other ways that can be used kriptanalis to solve, namely by looking at the frequency of occurrence of the letters as shown by the appearance frequency table the following letter:



Brute force attact also used to find the password and ID of a system. In this attack the attacker tried a few possibilities that exist from the list of words in the dictionary. Generally, this attack can succeed, just take a long time.
Listing program to decrypt the files using the code Emperor:

/ * Program decrypt files using the Caesar cipher * /
# Include
main (int argo, char * argv [])
{
File * Fin, * Fout;
char p, c,
int n, i, k;

Fin = Open (argv [1], "rb");
If (fin == NULL)
printf ("Error in opening file% s as input / n", argv [1]);
Fout = fopen (argv [2], "wb";
printf ("\ nDekripsi% s to% s... \ n", argv [1], argv [2]);
printf ("\ n");
printf ("k:");
scanf ("% d", & k);
while ((c = getc (fin))! = EOF)
}
P = (c - k)% 256;
Putc (p, Fout);
}
fclose (Fin);
fclose (Fout);
}

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Enigma Machine (Algorithm Cryptography)

Mesin Enigma



Pada Perang Dunia II, Jerman menggunakan enigma atau juga disebut dengan mesin rotor. Hitler menggunakannya untuk mengirim pesan ke tentarannya. Jerman sangat percaya  pesan yang dikirim  melalui enigma tidak akan terpecahkan kode enkripsinya. Anggapan itu keliru. Setelah bertahun-tahun mempelajarinnya, sekutu berhasil memecahkan kode-kode itu. Setelah Jerman mengetahui bahwa kode-kodenya telah terpecahkan maka enigma kemudian mengalami beberapa kali perubahan.
Enigma yang digunakan  Jerman bisa mengenkripsikan satu pesan yang mempunyai 15 milyar-milyar kemungkinan. Dari besarnya kemungkinan tersebut, Jerman tidak percaya bahwa pesan yang dikirim melalui enigma  akan dapat dipecahkan . Tetapi kenyataannya pesan-pesan Jerman bisa didekripsikan oleh sekutu.




Selama bertahun-tahun kriptografi menjadi bidang khusus yang hanya dipelajari oleh kalangan militer, seperti agen keamanan nasional Amerika (National Security Agent), Uni Soviet, Inggris, Prancis, Israel, dan Negara-negara lain yang telah membelanjakan miliaran dolar untuk mengamankan komunikasi mereka dari pihak luar. Mereka juga selalu mempelajari kode-kode rahasia Negara lain. Dengan adannya persaiangan ini makan kriptografi terus berkembang sesuai pekembangan zaman.

Namun dalam 30 tahun terakhir ini kriptografi tidak hanya dimonopoli kalangan militer saja. Hal yang sama juga dilakukan oleh individu-individu yang mengiginkan pesan dan komunikasi mereka tidak diketahui pihak lain. Setiap individu berhak mengamankan informasi keluarga, pekerjaan, bisnis, dan berbagai informasi lainnya. Apalagi sekarang persaingan begitu tinggi. Mereka rela megeluarkan sekian dolar hanya untuk menjaga privasi mereka.



Rotor pada enigma



Sejarah enigma


Enigma termasuk dalam kelompok mesin kripto berbasis rotor. Mesin berbasis rotor pertama kali dibangun dan dipatenkan oleh beberapa penemu dari Negara-negara berbeda dari tahun 1917 sampai 1921, diantarannya oleh warga Amerika Edward Hug Hebern, warga Jerman Arthur Gerhard Scherbius, warga Belanda Alexander Koch, dan warga Swedia Arvid Gerhard Damm.




Arthur Scherbius mengembangkan rancangan milik Koch yang telah dipatenkan, yang diberi nama Enigma. Semula ia berharap untuk menjual mesin enigma tersebut ke kalangan bisnis tetapi ternyata lebih sukses di pasar angkatan bersenjata. Tahun  1926, Angkatan laut Jerman memperkenalkan mesin kode Scherbius, modifikasi sedehana dari enigma versi komersial. Tahun 1930, Enigma versi militer dibangun. Perbedaan keduannya terletah pada penggunaan komponen baru, yaitu plugboard yang dapat meningkatkan aturan mesin dan juga pencarian kunci kode. Sejak pertengahan  1930, enigma telah digunakan oleh Angkatan Bersenjata Jerman. Diperkirakan jumlah mesin enigma yang digunakan pada tahun 1935 sampai 1945 mencapai 100.000 mesin.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Computer Troubleshooting Part VI

Continuous Restart your computer  

Restart the computer that you use the time constantly used.  

Solution:  

  • Restart continuing to occur because some things in between, the temperature is too hot computer system, motherboard, power supply is damaged, there are drivers that do not match / clash with other drivers, and RAM is damaged.  
  • If the power supply is damaged you should replace with new.  
  • If a driver is clashing then remember the last time you install your hardware drivers that cause frequent computer restarts. 
  • Uninstall the driver and find the latest drivers via the Internet. 
  • Or you can use sisitem restore to restore the settings of the computer back before the computer restarts as continuous normal.  
  • For the RAM is damaged should be replaced with new ones.
 
For Computer Does Not Automatically Restart  

Sometimes a computer restart after the BIOS POST (power on self test) or after Windows XP splash screen. And you do not know the errors that occur due to direct computer restarts.  

Solution: 
  • In order for the computer does not restart itself and error messages can be known then we have to turn off automatically restart on the Windows facilities. 
  • Click Start> right click My Computer> Properties.  
  • Move to the Advanced tab. At the startup and recovery click settings button. 
  • Start and Recovery window appears. 
  • Uncheck the Automatically Restart option.  
  • Click Ok.
 
Error message "Only of a ReadProcessMemory or WriteProcessMemory request was completed" and "The request Could not be performed Because of an I / O device error.  

When inserting the CD into the CD / DVD drive, a CD spinning but no reaction occurred nothing and appear the message. 

Solution:  
  • Click Start> right click My Computer> Manage. Computer Management window appears. 
  • Go to System Tools> Device Manager. 
  • Double-click the item IDE ATA / ATAPI controllers.  
  • Click the drive that is used by CD / DVD ROM. Properties window pops up from the drive.  
  • Switch to Advanced Settings tab. If the CD / DVD ROM is located on the primary select device 0, if it is located on the secondary select device 1. 
  • Then in the combo box select transfer mode PIO Only. 
  • Click Ok.
 
Dead Mouse Cursor As Substitute  

You wonder if anyone other than using the mouse to move the cursor, because sometimes you get bored using the mouse and would like another choice. 

Solution:  
  • You can use the number keys on the numeric keypad to move the cursor. 
  • Open the Control Panel> Accessibility Options. Accessibility Options window appears.  
  • Move to the Mouse tab. Select the checkbox Use Mouse Key.  
  • Then press the Settings button. Settings window appears for MouseKeys. 
  • Cylinder motion on the Pointer speed to control the speed and acceleration of the cursor.  
  • Click Ok.
 
Burning CDs without Using Windows XP  

You have a CD / DVD RW and will be used to copy a file onto a CD. But the software to copy the files were not included in the time to buy a CD / DVD RW. 

Solution: 
  • In Windows XP you can directly copy the files to a CD without any additional software to copy a file.  
  • Go to Control Panel> Administrative Tools> Services. 
  • Services window appears. Find IMAPI CD-Burning COM Service and double click.  
  • After the show the selection window, select Startup type select Automatic. 
  • Click Apply. Click Ok. Then restart the computer.  
  • To copy a file or folder is to drag / copy-paste to a CD / DVD RW.  
  • Then right-click CD / DVD RW choose Write These Files To CD.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Computer Troubleshooting Part V

Run Computer Program Hang 

When he was running the computer suddenly stops running programs and there is no response. After waiting a while it still happens.  

Solution:

  • This is due to the workload of the processor or RAM increase. 
  • If you run multiple programs at once then close / turn off programs that are not really necessary.  
  • If a way close the usual no response, then use the key combination I press Ctrl + Alt + Del simultaneously. Will display the Windows Task Manager.  
  • Programs that hangs its status is Not Responding. Select the application and press the End Task command. After that comes the dialog End Task End Now. 
  • If this can not yet provide a solution, then restart the computer becomes the best choice.
 
CRACKLE from the casing due to fan  

You hear voices that are too noisy in the casing when menyalakn computer. This is annoying because the sound is breaking work your concentration.  
Solution: 
  • This is because the fan noise that is in the casing.  
  • The fan that is too much can also cause the sound to be noisy. 
  •  Open the lid casing, see the fan mounted on the chassis, heatsink, motherboard, power supply, and when visibly soiled hard drive and then remove and clean.  
  • Clean with a brush, if necessary, to give a lubricant kipar coil (bit only) for the fan noise can be reduced and disappear. If it is still too noisy, you try to reduce the fan attached.
 
Adding RAM, Windows Computer Will not Go  

Because of the need for capacity RAM in a sense of need then you decide to add with a new RAM chip. After the boot was not installed until the sisitem operation.  
Solution: 
  • Make sure the RAM you install the same type. Remove the new RAM back pieces and pieces of old RAM and clean.  
  • Clean up all memory slots on the motherboard. Put back into the slot. If you still can not enter the operating systems try to plug the chip RAM to another slot. 
  •  If not, you try to see the user manual of the motherboard to ensure the capacity and type of RAM that can be installed. Because not all motherboards can be installed RAM with a different brand and different capacity. 
  •  For more details look informasinnya to the motherboard vendor sites on the Internet.
 
Restart your computer because capacitors motherboard Frequently Damaged  

Computers normally used no problems suddenly restarted and this happened many times.  
Solution:  
  • Unplug that led to the computer. Open the lid casing, after seeing that there are capacitors on the motherboard turns out there is melting.  
  • Remove all the components (hard disk, VGA card, memory, power supply and cables attached to the motherboard) with caution.  
  • Replace these capacitors are melting. In this case can not be done alone if you must bring to a service person or an electronic motherboard.
 
Processor Upgrade but Could Not Listed to Processor Socket  

There is a computer exhibition that offers a variety of types of processors with different speeds. For that you decide to buy a processor to replace the existing processor for PC speed increases. However, when plugged into a socket turns will not be installed.  
Solution:  
  • If you can not be plugged into a socket processors this is due to the type of processor and socket on the motherboard are different.  
  • Before buying you should know what type of processor socket and any processor that can be used on the motherboard.  
  • You must exchange (sell) and buy the processor corresponding to processor sockets and can be used on the motherboard you have. 
 
The fan on the heatsink Dead  

Frequent computer restarts and after opening the case turned out the fan on the heatsink was not spinning. This is very dangerous for the processor.  
Solution:  
  • Check first whether the fan cable is properly plugged into the motherboard. If it turns the fan off then do a similar replacement fan.  
  • To replace a dead fan breaker leading to the computer. Open the casing, remove the hardware that connects to the motherboard.  
  • Open the first heatsink attached to the processor. This is to avoid opening a screwdriver pressure from the heatsink fan. 
  • Once separated from the processor heatsink, then you can safely remove the fan.  
  • Replace the fan with that kind of fan. Refit carefully.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Computer Troubleshooting Part IV Bluescreen


Bluescreen on the screen with the message "IRQL_NOT_LESS_OR_EQUAL (0X0000000A)"  


When the computer underwent a sudden your computer screen turned blue and there is an error message "IRQL_NOT_LESS_OR_EQUAL (0X0000000A)" 

Solution:  

  • This discrepancy is caused by drivers that are installed. Drivers in the computer that many would not all fit in and can cause problems.  
  • If you recently added hardware and install drivers ¬ her, this caused a bluescreen, then the drivers will need to uninstall. 
  •  Find the latest drivers on the internet (refer to the brand of hardware used.
 

Bluescreen on the screen with the message "PEN_LIST_CORRUPT" 

When running the computer, suddenly your computer screen turned blue, and there is an error message "PEN_LIST_CORRUPT". 

Solution:  
  • This is caused by damage to the RAM.Copot memory card from its slot. Remove the memory card from the slot. Clean the memory card from dirt and dust thoroughly.
  • Replace the memory card into its slot. 
  • Try installing into a few slots if still can. If not you should replace it with a new memory card.
 

Bluescreen on the screen with the message "MACHINE_CHECK_EXCEPTION"  

When running the computer, suddenly your computer screen turned blue and there is an error message "MACHINE_CHECK_EXCEPTION". 

Solution:  
  • This is caused by damage to the CPU in-overclok excessive or power supply that power shortage / damage.  
  • If your computer is overclocked promptly return to the normal position. But if the already damaged must be replaced with new ones.  
  • For the problem of power supply you should immediately replace with new ones because if the power goes into the computer system (hardware) is less then it could cause damage to other hardware.
 

Bios Can not Be Opened At some point you need to configure the BIOS because they want to boot from the CD ROM.  

It turns out BIOS passwords asked for membukannya. You are confused and forgot the password.  

Solution: 
  • If the motherboard is equipped with a jumper to reset the password / BIOS you can do by changing the position of this jumper. 
  •  To more clearly see the motherboard manual. 
  •  If not equipped with a jumper to reset the password / BIOS, then the other way is to unplug the CMOS battery located on the motherboard. 
  •  Let stand a minute for several minutes and plug it in again. So the BIOS settings will return to the beginning, and the BIOS password will be lost.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS