Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
used symmetric encryption for secret communication. It remains the more widely usedof the two types of encryption.A symmetric encryption scheme has five ingredients ( Figure 2.1 ):• Plaintext: This is the original message or data that is fed into the algorithm asinput.• Encryption algorithm: The encryption algorithm performs various substitu tionsand transformations on the plaintext.• Secret key: The secret key is also input to the encryption algorithm. The exactsubstitutions and transformations performed by the algorithm depend on thekey.• Ciphertext: This is the scrambled message produced as output. It depends onthe plaintext and the secret key. For a given message, two different keys willproduce two different ciphertexts.• Decryption algorithm: This is essentially the encryption algorithm run inreverse. It takes the ciphertext and the secret key and produces the originalplaintext.There are two requirements for secure use of symmetric encryption:1. We need a strong encryption algorithm. At a minimum, we would like thealgorithm to be such that an opponent who knows the algorithm and hasaccess to one or more ciphertexts would be unable to decipher the ciphertextor figure out the key. This requirement is usually stated in a stronger form:The opponent should be unable to decrypt ciphertext or discover the key evenif he or she is in possession of a number of ciphertexts together with the plaintextyang dihasilkan tiap ciphertext.2. pengirim dan Penerima harus telah memperoleh salinan kunci rahasia secara amanfashion dan harus tetap kunci aman. Jika seseorang dapat menemukan kunci danalgoritma, yang tahu semua komunikasi menggunakan tombol ini mudah dibaca.Ada dua pendekatan umum untuk menyerang enkripsi simetrisskema. Serangan pertama dikenal sebagai kriptoanalisis. Serangan Cryptanalytic mengandalkan
Sedang diterjemahkan, harap tunggu..
