Klik disini

Monday, May 10, 2010

Cryptography I


Security in communications over computer networks has now become an important issue. Cryptographic techniques are implemented on the IPsec communication protocol to obtain the security aspect. IPsec is a set of communications protocols that implement several cryptographic techniques to ensure the security of communication through computer networks. IPsec is a solution that is transparent to users because users do not need to recognize its existence karean wrapped IPsec IP packets with a header which in turn is transmitted as normal IP packets.

Protocol Authentication Header (AH) to ensure data integrity, while encapsulating Security Payload protocol (ESP) in addition to ensuring data integrity is also guaranteed confidentiality of data. IPsec is not a perfect communication protocol. High complexity, incomplete documentation for a standard, features that do not need (thereby increasing the complexity) is that it has some weaknesses. But until now, the IPsec security protocol is still regarded as the best compared to other IP security protocol.

At the beginning of its development, computer networks are used only for sending E-mails between universities for research purposes and for sharing the use of printers in an enterprise. To meet these goals, the security aspects of networks at the time did not receive significant attention. But now, when computer networks have also been used for a variety of banking and trading activities, primarily through the Internet, the security aspects of an issue that should receive great attention.

Cryptography is the science of disguising a message in order to maintain kerahasiaanya. A message (plan text) to go through the process first eknripsi into a form that does not mean (chiper text) before being submitted to an eligible recipient. Only parties who may be entitled to make the process description, ie change the text back into plain text chiper memakau a secret key. Plain text would be difficult to be derived from its text chiper by unauthorized people (people who do not have a key that corresponds with the text chiper). Cryptography adhere to the principle of confidentiality through obscurity (secret through obscurity).


0 comments:

Post a Comment

Klik Yang Ini