Archives

All posts for the month April, 2013

Model of Conventional Crytosystem

Published April 28, 2013 by Novi Eldanita

Model of Conventional Cryptosystem

We assume that it is impractical to decrypt a message on the basis of the ciphertext plus knowledge of the encryption/decryption algorithm. In other words, we do not need to keep the algorithm secret; we need to keep only the key secret. This feature of symmetric encryption is what makes it feasible for widespread use. The fact that the algorithm need not be kept secret means that manufacturers can and have developed low-cost chip implementations of data encryption algorithms. These chips are widely available and incorporated into a number of products. With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the key. Read the rest of this entry →

Jacques Mesrine – The Man of a Hundred Faces

Published April 24, 2013 by Novi Eldanita

Jacques Mesrine (28 December 1936 – 2 November 1979) was one of the most infamous criminals in modern French history. He was responsible for numerous murders, bank robberies, burglaries, and kidnappings in France and Canada. Mesrine repeatedly escaped from prison and made international headlines during a final period as a fugitive when his exploits included trying to kidnap a judge who had sentenced him. An aptitude for disguise earned him the moniker “The Man of a thousand Faces” and enabled him to remain at large while receiving massive publicity as a wanted man. Mesrine was widely seen as an anti-establishment ‘Robin Hood’ figure. In keeping with his charismatic image, he was rarely without a glamorous female companion. A pair of films which came out in 2008 were based on Mesrine’s life. Read the rest of this entry →

This is about X800 & RFC2828

Published April 4, 2013 by Novi Eldanita

X800

Security requirements are applicable at the information sent over the network. The discipline dealing with security over a network is called Network security

X.800 Recommendation
1.    provides a general description of security services and related mechanisms, which may be provided by the Reference Model; and
2.    defines the positions within the Reference Model where the services and mechanisms may be provided.

This Recommendation extends the field of application of Recommendation X.200, to cover secure communications between open systems. Read the rest of this entry →