Make it secret & secure!

Thursday, August 13, 2009

I think my class become more interesting now, when we going to learn deeper on cryptography method and techniques been using from past years ago until to newest techniques to suite the current technology.

So what is cryptography really about? Like this. Every of us must have a secret, and some have more than others. But when it becomes necessary to transmit those secrets from one point to another, it’s important to protect the information while it's in transit.

Cryptography presents various methods for taking legible, readable data, and transforming it into unreadable data for the purpose of secure transmission, and then using a key to transform it back into readable data when it reaches its destination, so only the right person get the authority to read that data or message.


Cryptography is the science of keeping data secure. It is a discipline which concerned with communication security such as confidentiality of messages, integrity of messages, sender authentication, regardless of the used medium such as pencil and paper or computers.

Cryptographic algorithms
  • Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
  • Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
  • Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information
Secret Key Cryptography

With secret key cryptography, a single key is used for both encryption and decryption. Refer to figure i attached at the end of the post, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.

Secret key cryptography algorithms that are in use today include:
  • Data Encryption Standard (DES)
  • Advanced Encryption Standard (AES)
  • CAST-128/256
  • International Data Encryption Algorithm (IDEA)
  • Rivest Ciphers (aka Ron's Code)
  • Blowfish
  • Twofish
  • Camellia
  • MISTY
  • KASUMI
  • SEED
  • Skipjack
Public Key Cryptography

Public-key cryptography has been said to be the most significant new development in cryptography in the last 300-400 years. Modern PKC was first described publicly by Stanford University professor Martin Hellman and graduate student Whitfield Diffie in 1976. Their paper described a two-key crypto system in which two parties could engage in a secure communication over a non-secure communications channel without having to share a secret key.

Public-key cryptography algorithms that are in use today for key exchange or digital signatures include:
  • RSA
  • Diffie-Hellman
  • Digital Signature Algorithm (DSA)
  • ElGamal
  • Elliptic Curve Cryptography (ECC)
  • Cramer-Shoup
  • Key Exchange Algorithm (KEA)
  • LUC: Can be used for encryption and signatures, using integer factoring.
Hash Functions

Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key (Figure 1C). Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file's contents, often used to ensure that the file has not been altered by an intruder or virus. Hash functions are also commonly employed by many operating systems to encrypt passwords. Hash functions, then, provide a measure of the integrity of a file.

Hash algorithms that are in common use today include:
  • Message Digest (MD) algorithms
  • Secure Hash Algorithm (SHA)
  • HAVAL (HAsh of VAriable Length)
  • Whirlpool
  • Tiger
So, i guess this figure can help you to understand the text!



Virtualization Software

Tuesday, August 4, 2009

Ok. In my first lab of this subject, Mr Zaki introduces us to an application named VMware. Actually I had using it before and I also already try on other kind of virtualization software such as Virtual Box. Not saying I’m very good in using VMware, still exploring on it. So, how about you? New to VMWare? Never know about it before? Some of my info here may help u, err, as the foundation. Better u installs it and exploring yourself! Its so flexible.





I can say that VMware (Virtual Machine) is a great application that lets us run another computer in our only one PC. Well, it means that we can try out another operating system; test a different platform in this virtual machine. It’s like we create hardware in our PC virtually and emulate it as another PC. This is what we call virtualization which nowadays many developers are leaping aboard the virtualization bandwagon and VMware became the marker leader.

Virtualization lets us run multiple virtual machines on a single physical machine, sharing the resources of that single computer across multiple environments. Different virtual machines can run different operating systems and multiple applications on the same physical computer.
  1. Run multiple operating systems on a single computer including Windows, Linux and more.
  2. Let your Mac run Windows creating a virtual PC environment for all your Windows applications.
  3. Reduce capital costs by increasing energy efficiency and requiring less hardware and increasing your server to admin ratio
  4. Ensure your enterprise applications perform with the highest availability and performance.
  5. Build up business continuity through improved disaster recovery solutions and deliver high availability throughout the datacenter.
  6. Improve enterprise desktop management & control with faster deployment of desktops and fewer support calls due to application conflicts
A virtual machine is a tightly isolated software container that can run its own operating systems and applications as if it were a physical computer. A virtual machine behaves exactly like a physical computer and contains it own virtual (ie, software-based) CPU, RAM hard disk and network interface card (NIC).



An operating system can’t tell the difference between a virtual machine and a physical machine, nor can applications or other computers on a network. Even the virtual machine thinks it is a “real” computer. Nevertheless, a virtual machine is composed entirely of software and contains no hardware components whatsoever. As a result, virtual machines offer a number of distinct advantages over physical hardware.

Virtual Machines Benefits

In general, VMware virtual machines possess four key characteristics that benefit the user:
  1. Compatibility: Virtual machines are compatible with all standard x86 computers
  2. Isolation: Virtual machines are isolated from each other as if physically separated
  3. Encapsulation: Virtual machines encapsulate a complete computing environment
  4. Hardware independence: Virtual machines run independently of underlying hardware
Huhu, this might be useful for dummies like me. You can learn so many thing about VMware from top to toe.hehehe http://www.youtube.com/VMwareELearning


intro to it security

Sunday, August 2, 2009

Hello there! Glad I still got the breath to post here, Thank You God. As I promise, I will share anything that i learn about network security with u all, even though whats my sharing was not so brilliant, at least we have something valued to gain, which is KNOWLEDGE!

Ok, as we know, computer security is a rapidly growing market as the world is gradually becoming united, in other words, globalization. World economy heavily depends on the usage of internet, albeit addressing the internet as a global village. Many people use the internet to promote their business ventures, products and even ideas, to the masses.

Therefore, the first day in Mr Zaki class, I realized the importance of network security. Just imagine, if I were to start up my own business and someone hack into my account and change my entire product, how would my business be? Surely, it would be down in the drains, isn't it..?

Ok, so what is network security or computer security?

Network security , i simplified as:
  1. How we protect the network
  2. Do not let the resources of our network accessed by hackers
  3. Consistent monitoring and measurement of its effectiveness (or lack) combined together.
The first is – small homes
  • A good network security is by having a basic firewall (COMODO is good).
  • What about Antivirus software? For me, the best is Kaspersky, but there are others like AVG, McAfee and Norton Anti Virus.
  • Use a robust password when using internet, k
  • Passwords, use them for all accounts
  • Tell your friends about network security!!
The Second is Medium business
  • U need a strong firewall
  • Strong Antivirus k (Kaspersky) and Internet Security SoftwareUse strong passwords like (sofia86heheheutem) and change it every fortnight
  • Use a robust password wen using wireless
  • Use a network monitor
  • Tell ur administrator to regularly check k..
The Third is Large Businesses
  • A good n strong firewall n proxy
  • Again, a good antivirus is suffice and internet security software
  • Very similar to medium business but add these 3 eh..
  • Security fencing – to mark the company’s perimeter
  • Fire extinguisher – for fire sensitive area
  • Security guard – to maximize physical security ok
The fourth is school
  • A good firewall and flexi proxy to allow different users to access
  • Strong antivirus
  • Children’s Internet Protection Act – very very important
  • Supervision from teaches and librarians
The last one is large government
  • Government needs a good protection right !! So –
  • Need a very very good firewall and superb proxy
  • Not only a strong antivirus but a strong encryption
  • Whitelist authorized wireless connection only and others block
  • All network must be placed in secure zones
  • Put all serves in DMZ
  • And the most important is security fencing – mark the perimeter and set wireless range..
With that, I hope we know one way or another to protect ourselves from those bad hackers and crackers!!!

first attempt 2 BiTS3413 <<< whats this?

first of all, salam everyone & my dearest lecturer whose of course would read my blog!

This was my first blog & i would never create my own blog until mR.Zaki Mas'ud, my lavourite lecturer for this subject force us to. haha thank sir, sometimes force is really right!

ok, BiTS3413 - Information Technology Security, as the name implies, of course, about the security in network, how to secure the network system, defend network from harms, attackers, dangers, and so on..also ways to secure the data and message being transmit through the network..wohoo..like so easy, but this briefing is kind of so general.

its ok, we will learn little by little later on..i pun still dalam proses belajar, so i will share with u all on the next post, see ya!