Sie sind auf Seite 1von 6

ENGINERING IDEA

NUMERICAL THEORY

CREATED BY :

ZULFAN (4163312034)

LATIF IRFAN (4163312015)

STATE UNIVERSITY OF MEDAN


FACULTY OF MATHTEMATICS AND NATURAL
SCIENCES
BILLINGUAL MATHTEMATICS EDUCATION
2016
INTRODUCING
A. Issue Background
Along with the times, then comes a new branch of mathematics
called discrete mathematics. The rapid development of science discrete
mathematics is closely related to the rapid development of the computer
world of digital, because digital computers work discretely. Development
of discrete mathematics is also followed by the development of other
sciences that use mathematics as a foundation of knowledge. One is the
science that uses kriptrografi integers theory as the foundation of science.
In his presentation below will explain that especially discrete mathematical
theory of integers has a very close relationship with the science of
cryptography. Additionally, it will also explain about the application of this
keriptografi science in everyday life.
In everyday life, we must have often found that an exact science,
especially mathematics and various other branches of mathematics are
very much used by humans to help solve a problem. Ranging from small
and traditional, until the problem is large and modern.
Along with the times, then comes a new branch of mathematics
called discrete mathematics. The rapid development of science discrete
mathematics is closely related to the rapid development of the computer
world of digital, because digital computers work discretely. Development
of discrete mathematics is also followed by the development of other
sciences that use discrete mathematics foundation of knowledge. One is
the science that uses kriptrografi integers theory as the foundation of
science.
Cryptography is a branch of science that is used to maintain the
confidentiality of messages by way of disguise and make password form
that has no meaning.

B. Purpose
Can make the idea of new ideas of discrete mathematics
relationship with the use of cryptography.
THEORY NUMBER OF APPLICATIONS IN DAILY LIFE

1. Cryptography in Everyday Life


Our lives today are surrounded by cryptography. Cryptography has been used in a variety
of applications, ranging from ATM withdrawals, credit card usage, the use of a smart card (smart
card), a conversation on a mobile phone, computer passwords, television, e-commerce
transactions on the Internet, through the activation of missiles and bombs nuclear. This chapter
briefly discusses the application of cryptography in everyday life.
a. Smart Card (Smart Card)
One application that uses cryptography is a smart card (smart card). Smart cards (figure
1.3) is currently growing very rapidly. Smart cards are similar to credit cards can serve many
functions, ranging from authentication to data storage. By using a smart card, users can access
information from a variety of equipment with the same smart card.

Smart cards are the most popular memory cards and microprocessor cards. Memory card
is similar to a floppy disk, whereas the microprocessor card is similar to a small computer with
the operating system, security, and data storage. Smart cards have several types of interfaces
(interfaces) are different. Common type of interface is the contact interface, which in this case a
smart card inserted into the reader (card reader) and physically physical contact between the tool
and the card (Figure 1.4).

Smart cards store private keys, digital certificates, and other information. Smart cards also
store credit card numbers and personal contact information (telephone number). Certificates are
digitally signed by the card issuer (CA) to certify the public key owner of the card.
The use of smart cards combined with a PIN (Personal Identification Number). So, there
are two levels that must be on the use of smart cards, which have the smart card itself and know
the PIN to access information stored on the card. Computer server authenticates the card by
sending a value or string (called a challenge) to the card to be signed using the private key (stored
in the card), then the signature is verified by the machine using the public key owner of the card.
Computer server needs to store the card issuer's public key to validate digital certificates.
Many mobile devices that use a smart card for authentication. But the smart card still does
not guarantee total safety. If the mobile device is lost or stolen, digital certificates and private keys
in the smart card (contained in the equipment) could potentially be accessed by thieves to access
confidential information. Cell phones with GSM technology has an integrated smart card in the
phone. Own mobile phone has the option to set a PIN for added protection, so that if the phone is
lost or stolen, the phone can not be used without knowing the PIN.
Smart cards Wireless Identity Module (WIM) included in the Wireless Application
Protocol (WAP). WIM card protects mobile communications and transactions with digital
signatures. WIM card provides security for digital certificates, management of PIN codes, keys
and digital signatures. WIM store the encryption algorithms are required in the smart card. All
functions necessary for system security and privatization incorporated into smart cards.

B. Transactions through automated teller machine (atm)


Automated Teller Machine or Automatic Teller Machine (ATM) is used bank customers to
conduct banking transactions,. Primarily, usability ATM to withdraw the money in cash (cash
withdrawal), but is now also used for ATM cash transfer (transfer), check balances, pay bills phone
cards, buying train tickets, and so on.
Transactions via ATM requires a magnetic card (also called ATM cards) are made of plastic
and PIN (Personal Information Number) associated with the card. PIN consists of 4 digits that must
be kept confidential by the owner of the ATM card, because other people who know the PIN can use
the ATM card is stolen or lost to withdraw money.
The PIN is used to verify that the card is inserted by the customer at the ATM. The
verification process is carried out in the central computer (host) bank, therefore there must be two-
way communication between the ATM and the host computer. ATM send PIN and additional
information on the card to the host computer, the host verify by comparing the PIN that are entry-kan
by the customer with the PIN stored in the database host computer, and then send a response message
to the ATM stating whether the transaction can be continued or rejected.
During transmission from the ATM to the host computer, the PIN must be protected from
eavesdropping by unauthorized people. A form of protection that is done during the transmission is to
encrypt the PIN. On the bank side, the PIN is stored in the database are also encrypted (see Figure
1.5).

The encryption algorithm used is DES in ECB mode. Because DES works by encrypting
block 64-bit, then the PIN which only consists of four digits (32 bits) must be coupled with padding
bits so that the length to 64 bits. Padding bits are added different for each PIN, depending on
additional information on each ATM card [PIN02].
Because the PIN is only 4 digits long, the opportunity is huge predictable. Someone who
obtain an ATM card stolen or lost can try all possible PIN codes are possible, because there are only
10 10 10 10 = 10,000 possibilities 4- digit PIN code. To resolve this problem, most ATM's only
allow pengentry maximum PIN three times, if 3 times remains one of the ATMs will 'swallow' ATM
card. This problem also shows that cryptography is not always able to solve the problem of data
security.
Some ATMs now use a smart card to enable the use of public key cryptography. ATM card
containing the user's private key and digital certificate signed by the card issuer (CA) to certify his
public key. ATM card authenticates by sending a string to the card to be signed using the private key,
and the signature is verified by using the public key ATM card owners. As with all systems based on
digital certificates, ATM terminal needs to have a copy of the public key card issuer with a view to
validating digital certificates. This is realized by installing a public key into the ATM machine.

C. Communication with cell phones


The use of cellular phones (mobile phones) or more dieknal with the name of a cell phone
(mobile phone) that is mobile allows people to communicate from any place. Mobile phones are
wireless (wireless), so that messages sent from mobile phones are transmitted via microwave
(microwave) or radio until he reached the base station (BST) nearby, then transferred to the phone
penerim. GSM is a cellular phone technology the most widely used worldwide.
Because intercepting radio signals much easier than tapping signals on the cable channel, then
this means that GSM is not safer than a conventional fixed telephone. To create a secure
communication via mobile phone, then the message is encrypted during transmission from the mobile
phone to the nearest BST. The encryption method used is the method of cipher stream (stream cipher).
Another security issue is the identity of the caller. Mobile operators should be able to identify
a call (call) and know the identity of the caller (if the caller is a user / customer of the mobile
operators or users / subscribers of other operators).
Thus, the required two GSM security needs, namely:
1. The caller authentication (user authentication), which is a requirement for the system,
2. confidentiality (confidentiality) message (voice or data), which is a requirement for the
customer,
Two of this need is met by the use of a smart card (smart card) personal-called SIM card (Subscriber
Identity Module card). The SIM card contains:
1. The identity of the subscribers / users of mobile carriers such as the IMSI (International
Mobile Subscriber Identity) is a unique value,
2. authentication keys along the 128-bit secret known only by the operator. This value is
used as a key in the authentication protocol using encryption program selected by the
operator (algorithm A2, A3, or A5),
3. PIN (if set by the user).
4. Program encryption.
Overall, GSM security system consists of the three components, namely:
1. SIM card,
2. handset (mobile telephone),
3. GSM network (such as network ProXL, Sympathy, IM3). Each network is operated by the
operator respectively (Excelcomindo, Telkomsel, Satelindo). Computer operator (host)
has a database that contains the identity (IMSI) and authentication keys secret all
customers / users of GSM.
CONCLUSION

From the description above paper, we can conclude that the theory of discrete mathematics
especially integers has a very close relationship with the science of cryptography as described above.
Because of the past decade working digital computer discretely or continuously progressing very
rapidly, then the discrete mathematics and cryptography are also experiencing rapid development
directly because there is a close relationship between the two.
Cryptography in Indonesia called coding which briefly may mean art protecting data and
information from the parties that do not demand either when transmitted and when it is stored. While
the science of password called cryptology namely the study of how the technique to protect data and
this information along with the entire crop. Users are given an ID and password to access the system.
The password is encrypted to prevent unauthorized access to the system, for example the theft of
sensitive data by those who are not entitled. To get this encryption not needed because the cost has
been published in general. Therefore, it can be concluded that the cryptography is still an effective
system in terms of security and protection and can be widely used in various fields of business and
technology In this case we find its application in everyday life one example mentioned in the
Transaction In ATM.
It may be said that human life is surrounded by cryptography and discrete mathematics.
Therefore, as human beings who live in this modern age, we expected to be able to develop at least
understand both the science.

Das könnte Ihnen auch gefallen