This document was created with the aim to promote the cryptographic community. Because, there are many comrades who considers cryptography as a science that is very high and difficult to learn, and some even categorize this as an occult science. I'm not going to say that the science is easy, and can be learned overnight. Not friends, all that good science takes the process.
Document is not meant to be the main reference for cryptography. More precisely if the document is used as a "signpost" to the world of cryptography exciting and fun with the possibilities of exploitation without limit. To my friends who have higher knowledge and experience in this field, with all humility, I ask permission and understand the mistakes that may exist in this document.
The initial goal of cryptography is to hide the message content that can not be read by those who do not want, but can still be understood by the addressee. With changing times, cryptography is widely applied in various fields, ranging from information exchange in the second world war, to the computerized world we experience today.
This document, of course, would not discuss how the Nazis operated "Enigma", thus confusing the allies. This document is "only" going to discuss cryptography and its implementation in the field of IT. Implementation will be demonstrated as well just basic implementation and is "offline", not sophisticated implementations such as "transaction mail," "pay pal autorization", "cryptographic handshake", etc.. But, believe me guys, all sophisticated implementations, based on the basic implementation.
In this document will use the term commonly used in cryptography documents. An example is the "plain text", which is the original message that would be submitted. "Cipher text", which means that the message has been encrypted. And other terms that may be confusing, sorry if that happens.
True to its title, this document uses Borland Delphi 7 as the compiler used codes. Why? Yep, because I was most comfortable using Delphi with versions for things that smell cryptography. You can choose to use another compiler is your favorite. For cryptographic library which is used as a reference. In addition to open source, the reason I use it is a complete library of cryptographic methods are used. But again, this is not binding. You are free to use any library that suits you, or if you have quite understand the flow of the algorithm is a method, you can write your own libraries.
Implementation files are included in this document is the source that is ready to be compiled. For my friends who have Borland Delphi 7 installed on their computers, can directly click the file with the extension "dpr". For those who do not install the compiler, to know the content of the program code, can open a file with the extension "fit" with notepad or other text editor. File "exe" is also included to see the direct implementation.
From the resulting output, cryptography can be divided into two, namely cryptography "one-way" and "two-way". And in cryptography "two-way" was, in view of the kind of "key" that is used, can be divided into two, namely "symetric key" and "Asymetric key". That's about the framework of this document. Although fragmented as it is, did not rule out any type of cryptography are implemented together, or better known as the "hybrid". At the end of the document, will be demonstrated implementation of this hybrid method.
In the implementation of the IT world, plain text inputted into cryptography, the shape can vary. Can exe files, documents, pictures, music, and all other digital files. Depending on the user Meng implement it. This is why the possibilities become infinite in cryptography and very interesting!
0 comments:
Post a Comment