My blog audience

Diberdayakan oleh Blogger.
RSS

Cryptographic Algorithm


Judging from its origin, the word algorithm has an interesting history. This word appears in the Webster dictionary until the end of 1957. Algorism word means in Arabic the calculation process. Algorithm derived from the name of a famous Arab author, namely Abu Ja'far Muhammad ibn Musa al-Khuwarizmi (al-Khuwarizmi read by Westerners as algorism).  




Algorism words gradually transformed into algorithms.
Terminology definition algorithm is a sequence of logical steps to solve problems systematically arranged. Cryptographic algorithms is a logical steps how to hide messages from people who are not entitled to any message. 


Cryptography algorithm consists of three basic functions, namely:  


1. Encryption: 
It is very important in cryptography, the security of data sent to kept confidential. Original message is called plaintext, which is converted into code that is not understood. Encryption can be defined by cipher text or code. Similarly, we do not understand a word then we will see it in the dictionary or glossary. Unlike the case with encryption, to change the original text-text-code to the form we use an algorithm that can encode the data we want. 

2. Decryption:  

the opposite of encryption. The encrypted message is returned to the original form (text-native), called the decryption messages. Digunkan algorithm is different from the algorithms used for encryption. 

3. Key: 

is the key to encrypt decryption. The key is divided into two parts, a secret key (private key) and public key (public key). 




The security of cryptographic algorithms depends on how the algorithm works. Therefore, such an algorithm called algorithm is limited. The algorithm used merupakanalgoritma limited group of people to hide messages they send. If one of the members of the group's exit from the group, then the algorithm used is replaced with new ones. If not then it can become problems day later cryptography .


Security of modern cryptography with secret keys obtained from someone else owned, without having to keep the algorithm itself. The key has the same function with a password. If the overall security of the algorithm depends on which key is used then the algorithm can be published and analyzed by others. If the algorithm has published biased solved in a short time by another person it means that the algorithm is not safe to use. In the following discussion will explain the various kinds of cryptographic algorithms in existence.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

0 komentar:

Posting Komentar