Beruflich Dokumente
Kultur Dokumente
CRYPTOGRAHY
EKO MAHENDRO S / 12181403
M ZEFRI SUGIANTO / 12181080
EGI AGUSTIAN / 12181864
IMAM MAULUDIN / 12180923
MUHAMMAD FAHRUR ROZAQI / 12182241
IRWAN MUHICKAL / 12183532
ADITHYA KURNIAWAN / 12182585
ARIO MUSTOPA / 12181071
LAMSEN SIAHAAN / 12184363
The history of writing the oldest secrets can be found in ancient Egyptian civilization, namely in 300
0 BC. The Egyptians used secret carvings called hieroglyphics to convey messages to entitled peo
ple. Beginning in 400 BC the Spartans in Greece used cryptography in the military field by using a d
evice called a scytale, which is a long band made from papyrus leaves that are read by being rolled
into a cylinder. Whereas Chinese and Japanese civilizations discovered cryptography in the 15M
.
04 05
PICTURE SCYTALE
continued
first In England, the cryptanalytic effort at Bletchley Park during World War II spurred the development of more eff
icient tools to carry out repetitive tasks. This led to the development of Colossus, the first digital computer that wo
rked fully electronically, which helped encoders to describe the Lorenz SZ40 / 42 engine belonging to the German
army. Broad open cryptographic academic research is still relatively new, in the mid-1970s. At this time, IBM pers
onnel designed an algorithm that became the Federal data encryption standard; Whitfield Diffie and Martin Hellm
an published their agreement algorithm. [17] and the RSA algorithm published by American columnist Martin Gar
dner. Since then, cryptography has been very widely used in the world of communication, computer networks, an
d computer security in general. Some modern cryptographic techniques can save the secret key when using com
plicated mathematical problems, such as integer factorization or discrete logarithmic problems, so there is a deep
connection with abstract mathematics.
TERMS IN CRYPTOGRAPHY
In cryptography some important terms will be found including plaintext, cipher
text, encryption, decryption, cryptanalysis, and cryptology. Plaintext is data th
at can be read, while the technique for making data unreadable is called encr
yption. Encrypted data is called ciphertext, and the technique for returning a c
iphertext to a plaintext is called decryption. Cipher is a cryptographic algorith
m, which is a mathematical function that plays a role in data encryption and d
ecryption. Actors who are experts in the field of cryptography are called crypt
ographer. Cryptanalysis is the science of solving ciphertexts into plaintexts no
t through proper means, while people who master this knowledge are called
Cryptanalysts. The branch of mathematics which includes cryptography and c
ryptanalysis is called Cryptology, while people who master this knowledge are
called cryptologists.
continued
B. Key-Asymmetric Password Algorithm
This scheme is an algorithm that uses different keys for the encryption and decryption process. This scheme is al
so called public key cryptographic system because the key for encryption is made known to the public (public-ke
y) or can be known to anyone, but for the decryption process can only be done by the authorities who have the s
ecret key to decrypt it, called private-key
. .
BENEFITS OF CRYPTOGRAPHY
.
CONCLUSION
Cryptography is one of the ancient communication and information media utilized to date. Cryptography in In
donesia
. is called coding, which can mean briefly the art of protecting data and information from parties that a
re not desired either when transmitted or when stored. While the science of coding is called cryptology, which
is the study of how to protect data and information techniques along with all the followings. Users are given a
n ID and password to access the existing system. The password is encrypted to prevent illegal access to the
system for example theft of important data by those who are not entitled. Likewise, encryption of important fil
es can be done (eg files containing financial data). The encryption method used can be in the form of symme
tric key encryption, for example using the DES, RSA, etc. To get this encryption algorithm no cost is needed
because it has been publicly published. Therefore, it can be concluded that cryptography is still a system that
is effective in terms of security and protection and can be used widely in various fields of business and techn
ology
Thank you
MINAL AIDIN WAL FAIZIN ALL