Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
used symmetric encryption for secret communication. It remains the more widely usedof the two types of encryption.A symmetric encryption scheme has five ingredients ( Figure 2.1 ):• Plaintext: This is the original message or data that is fed into the algorithm asinput.• Encryption algorithm: The encryption algorithm performs various substitu tionsand transformations on the plaintext.• Secret key: The secret key is also input to the encryption algorithm. The exactsubstitutions and transformations performed by the algorithm depend on thekey.• Ciphertext: This is the scrambled message produced as output. It depends onthe plaintext and the secret key. For a given message, two different keys willproduce two different ciphertexts.• Decryption algorithm: This is essentially the encryption algorithm run inreverse. It takes the ciphertext and the secret key and produces the originalplaintext.There are two requirements for secure use of symmetric encryption:1. We need a strong encryption algorithm. At a minimum, we would like thealgorithm to be such that an opponent who knows the algorithm and hasaccess to one or more ciphertexts would be unable to decipher the ciphertextor figure out the key. This requirement is usually stated in a stronger form:The opponent should be unable to decrypt ciphertext or discover the key evenif he or she is in possession of a number of ciphertexts together with the plaintextthat produced each ciphertext.2. Sender and receiver must have obtained copies of the secret key in a securefashion and must keep the key secure. If someone can discover the key andknows the algorithm, all communication using this key is readable.There are two general approaches to attacking a symmetric encryptionscheme. The first attack is known as cryptanalysis. Cryptanalytic attacks rely on
Sedang diterjemahkan, harap tunggu..
