Современные информационные технологии/ 1.Компьютерная
инженерия.
Bulatova
M.B.
Kostanay
State University named after A. Baitursynov, Kazakhstan
Cryptographic means of information protection
Cryptography (or cryptology;
from Greek κρυπτός,
"hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia,
"study", respectively) is the practice and study of techniques for
secure communication in the presence of third parties (called adversaries). More generally, it is about
constructing and analyzing protocols that
overcome the influence of adversaries and which are related to various aspects
in information security such as data confidentiality, data integrity, authentication, and non-repudiation.
Modern cryptography intersects the disciplines of mathematics, computer science,
and electrical engineering. Applications of
cryptography include ATM cards, computer passwords,
and electronic commerce.
Cryptography prior to the
modern age was effectively synonymous with encryption, the conversion of information from a readable
state to apparent nonsense.
The originator of an encrypted message shared the decoding technique needed to
recover the original information only with intended recipients, thereby
precluding unwanted persons to do the same. Since World War I and the
advent of the computer, the methods used to carry out cryptology have become
increasingly complex and its application more widespread.
Modern cryptography is
heavily based on mathematical theory and computer science practice; cryptographic
algorithms are designed around computational hardness assumptions, making
such algorithms hard to break in practice by any adversary. It is theoretically
possible to break such a system but it is infeasible to do so by any known
practical means. These schemes are therefore termed computationally secure;
theoretical advances, e.g., improvements in integer factorization algorithms, and faster computing technology require these
solutions to be continually adapted. There exist information-theoretically secure schemes that provably cannot be broken even with unlimited
computing power—an example is the one-time pad—but
these schemes are more difficult to implement than the best theoretically
breakable but computationally secure mechanisms.
Information in today's
society is one of the most valuable things in life that requires
protection against unauthorized access of people not having access to it.
Appearance in the mid-twentieth century of the first electronic computer
utilities radically changed the situation in the field of encryption (
cryptography ) . The problem of ensuring the necessary level of protection of
information proved ( and it is a domain validated by both theoretical studies
and practical experience of the decision) to be very complex, requiring for its
decision not only implementing a certain set of scientific, technical and
organizational measures and the use of specific tools and methods , but
creating an integrated system of organizational measures and the use of
specific tools and methods for the protection of information. Volume of
circulating information in society is steadily increasing .
Popularity of worldwide network Intrenet in recent
years contributes to doubling of information every year. In fact, on the eve of
the new millennium, humanity has established an informational society in which
the well-being and even survival of humanity in its current capacity depends on
the successful operation of information processing. Widespread introduction of
personal computers has brought the level of "informatization" of
business life to a new level . The task of cryptography, i.e. covert
communication, is only for information that needs protection . In such cases
it’s said that information contains proprietary or protected , private ,
confidential , secret . For most typical , common cases of this type introduced
even special concepts: a state secret ; military secret , trade secret , the
secret law , patient confidentiality , etc.
Cryptography - is a set of methods of protection of
information interactions from deviations from their normal , regular flow
caused by malicious acts of different persons, methods, based on secret
algorithms(schemes) of transforming information, including algorithms which are
not strictly confidential , but uses covert parameters . Historically, the
first task of cryptography was to protect
text message from reading their content by unauthorized users, which is
reflected in the title of this discipline; this protection is based on the use
of "secret language" known only to the addresser and the addressee,
all encryption methods are only the development of the philosophical idea. With
the increasing complexity of information interactions in human society have
emerged and continue to evolve the task of protecting information, some of them
have been resolved in the framework of cryptography , which required the
development of new approaches and methods.
Cryptographic means of protection are special means
and methods of transformation of information as a result of which its content
is masked . The main types are closing cryptographic encryption and data
encoding. Encryption is a kind of a closure , when the transformation is
subjected to each self- closable symbol; data, protected by data encoding, is
divided into blocks having the meaning , and each block is replaced with
numeric, letter or combined source . It uses several different encryption
systems : substitution, permutation , divisive data transformation.
Any modern cryptographic system is based upon the use
of cryptographic keys. It works under a specific methodology ( procedure) ,
consisting of one or more encryption algorithms ( mathematical formulas ); of
keys using these encryption algorithms ; key management system , plaintext ,
and ciphertext. Cryptography today - is the most important part of information
systems : from email to cellular network, from access from the Internet to
electronic cash .
Nowadays, computer security is a house of cards , which can fall apart at any moment. Too
many weak products still were not crashed just because they are little used .
Press will immediately give publicity to these attacks , undermining public
confidence in these cryptosystems . In the end, the safety of cypherproducts
will determine its victory in the market.