    {"id":379,"date":"2017-09-30T15:08:28","date_gmt":"2017-09-30T15:08:28","guid":{"rendered":"http:\/\/student-activity.binus.ac.id\/csc\/?p=379"},"modified":"2017-09-30T15:11:20","modified_gmt":"2017-09-30T15:11:20","slug":"cryptography-and-cryptanalysis","status":"publish","type":"post","link":"https:\/\/student-activity.binus.ac.id\/csc\/2017\/09\/cryptography-and-cryptanalysis\/","title":{"rendered":"Cryptography and Cryptanalysis"},"content":{"rendered":"<p><strong>Cryptography and Cryptanalysis<\/strong><\/p>\n<p><strong>Cryptography<\/strong> is a method to secure your communication in the presence of third parties. <strong>Cryptography<\/strong> usually changes the letter with <strong>pre-defined<\/strong> code or using algorithm and math to create the new code. For the simple example, we have the calculation of alphabet <strong>ASCII<\/strong> and want to secure the communication by increasing the alphabetic <strong>ASCII<\/strong>. Then when we communicate, we will <strong>encrypt<\/strong> the alphabet and increase the <strong>ASCII<\/strong> by the number we have decided.<img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-380\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2017\/09\/a.jpg\" alt=\"\" width=\"436\" height=\"153\" \/><\/p>\n<p>If we do this, there would be a trouble for people who don\u2019t know what the algorithm we use to <strong>encrypt<\/strong> those codes. This could secure the word and only those who know the algorithm will understand the code. For a simple example, we determined the codes will <strong>encrypted<\/strong> by increasing the <strong>ASCII<\/strong> by three. For the algorithm could be seen below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-381\" style=\"font-style: normal;font-weight: normal;font-family: 'Open Sans', Helvetica, Arial, sans-serif;font-size: 14px\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2017\/09\/b.jpg\" alt=\"\" width=\"486\" height=\"119\" \/><\/p>\n<p>Then, if <strong>encrypt<\/strong> \u2018A\u2019, it will become \u2018D\u2019\u2019<\/p>\n<p>But again, this is just a simple kind of <strong>cryptography<\/strong>.<\/p>\n<p>As for <strong>Cryptanalysis<\/strong>, <strong>Cryptanalysis<\/strong> is a method or process to find a weakness in <strong>cryptographic<\/strong> algorithm and using the weakness to <strong>decrypt<\/strong> \/ <strong>decipher<\/strong> the code or the secret key. Usually cryptanalysis used to decode and discover how the cryptography algorithms work. Like the first time when you get a code, you will do the analysis for the code and discover what kind of algorithm it uses.<\/p>\n<p>There are a various types of cryptanalysis, based by amount and qualities of secret information are discovered:<\/p>\n<ul>\n<li>Total Break<\/li>\n<\/ul>\n<p>The attacker deduces the secret key (fully discover about the algorithm and the secret code mean)<\/p>\n<ul>\n<li>Global deduction<\/li>\n<\/ul>\n<p>The attacker more likely to know about the algorithm or the equivalent algorithm it used, but they didn\u2019t discover what the secret code means<\/p>\n<ul>\n<li>Information Deduction<\/li>\n<\/ul>\n<p>The attacker could gain some information about the secret code, but didn\u2019t discover how the algorithm works<\/p>\n<ul>\n<li>Distinguishing algorithm<\/li>\n<\/ul>\n<p>The attacker has the ability to discover how the encryption works and could distinguish the output for a different permutation<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Source<\/strong>:<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptography\">https:\/\/en.wikipedia.org\/wiki\/Cryptography<\/a><\/p>\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/Cryptanalysis\">https:\/\/www.owasp.org\/index.php\/Cryptanalysis<\/a><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptanalysis\">https:\/\/en.wikipedia.org\/wiki\/Cryptanalysis<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography and Cryptanalysis Cryptography is a method to secure your communication in the presence of third parties. Cryptography usually changes the letter with pre-defined code or using algorithm and math to create the new code. For the simple example, we have the calculation of alphabet ASCII and want to secure the communication by increasing the [&hellip;]<\/p>\n","protected":false},"author":42,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,4,1],"tags":[],"class_list":["post-379","post","type-post","status-publish","format-standard","hentry","category-articles","category-featured","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/comments?post=379"}],"version-history":[{"count":1,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/379\/revisions"}],"predecessor-version":[{"id":382,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/379\/revisions\/382"}],"wp:attachment":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/media?parent=379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/categories?post=379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/tags?post=379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}