Kamis, 30 Mei 2013

Encryption And Decryption

Encryption is the process of encoding messages or information in such a way that hackers cannot read it, but the authorized parties can.

In an encryption scheme, the message or information is encrypted using an encryption algorithm, turning into an unreadable ciphertext. This is usually done with the use of an encryption key, which specifies how the message is to be encoded.

Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by human or computer without the proper cipher to decrypt it.

There are two basic types of encryption schemes :
1. Symmetric-key schemes, the encryption and decryption keys are the same. Thus communicating parties must agree on secret key before they wish to communicate
2. Public-key schemes, the encryption key is publish for anyone to use and encrypt messages. however, only the receiving party has access to the decryption key and is capable of reading the encrypted messages.

Purpose of Encryption :
1. Confidentiality : That is to keep the content of information of anyone other than who has the authority or the secret key to unlock the encrypted information,
2. Data Integrity : To maintain the authenticity or integrity of the data, the system must have the ability to detect data manipulation by parties who are not entitled to, such as insertion, deletion, and other data pensubstitusian into the actual data,
3. Authentication : This relates to the identification  or recognition, both the unity and the information system it self,
4. Non-repudiation : Is an attempt to prevent denial of shipment or creation of an information by the send or make.

Encryption Excess :
1. Confidentiality of information guaranteed,
2. Provide authentication and integrity protection,
3. Tackling the phone tapping and e-mail,
4. For digital signature.

Encryption Weakness :
1. Brute force attack,
2. Encryption terrorist plot,
3. Improper handling or human error the lack of encryption of data management,
4. Deficiencies in the cipher itself,
5. Concealment of criminal record by a criminal,
6. Messages can not be read when the message recipient forgotten or lost keys.

Some interesting politics surround strong Encryption :
1. Strong encryption algorithms are considered to be a munitions by the US government,
2. Some countries forbid their citizens from using encryption,
3. Strong encryption algorithms are freely available everywhere in the world, on the internet.

Decryption is the process of converting encrypted data back into its original form, so it can be understood.