Cryptography is a science and an art to maintain the confidentiality of a message or a short meaningful ways to maintain privacy when communicating. For the purpose encryption and decryption is performed on messages or important documents confidential. Encryption is the process of transforming data into a form that is difficult / not understandable.
Types of attackers • Joyriders. • Vandals. • Score Keepers. • Spies (Industrial & Otherwise). • Stupidity & Accidents.
These types of attacks: • Intrusion. • Denial of Service. • Information Theft. 

Intrusion ie the attacker can enter or access the computer / system that will be attacked. The trick there is a variety, can be disguised as a legitimate user, taking advantage of bugs in the system, taking advantage of a weak system configuration, or can by installing a backdoor / Trojan horse to facilitate the acquisition of access rights. Denial of Service type of attack that is spent by a system resource such as bandwidth, processing power and storage capacity. Types of attacks like this very much applies today and is detrimental to the user because a user created can not use his computer facilities such as surfing the Internet for low bandwidth. Information theft is the type of eavesdropping attack with some sort of code or password to access a system. This type is many ways to use, and one that is discussed in this paper is Acoustic Cryptanalysis. 

In general, kriptanalisis have understanding as a study chiper, chiperteks, or cryptosystem is trying to hide the system by examining the code to find weaknesses in systems that will enable an uncovered from chiperteksnya plaintext without knowing the key algorithm. In short, trying to break the cipher kriptanalisis, cipherteks or cryptosystem. There are various methods for data tapping kriptanalisis that have been developed, namely: a. Wiretapping: tapper to intercept data transmitted on the cable channel of communication by using a hardware connection. b. Electromagnetic eavesdropping: tapper to intercept the data transmitted through wireless channels, such as radio and microwave. c. Acoustic eavesdropping: Capturing the sound waves generated by the system or the human voice. Last two methods utilize the information leak in the transmission process that is often not realized by using a common analytical technique known as side-channel cryptanalysis. Side-channel analysis technique is a powerful tool and is able to defeat the implementation of the algorithm is very powerful because it integrates a very high istem expertise. Media attacks are often used namely: a. Electromagnetic Leakage: using electromagnetic radiation which are captured by the antenna b. Timing Attack: an attack based on the measurement system response time to reduce the possibility of testing in determining a password. c. Thermal Analysis: using diffusion of heat generated processor to determine the specific activity of the system and take advantage of changes in temperature on the storage media. d. Power Analysis: measure the difference in energy usage within a specific time period when a microchip processing a function to secure information. This technique can yield key information about the computational algorithms used in encryption and other security functions. e. Sound Attack: exploiting the voice / sound produced by the system. One of the implementation of the attacks on the media last is Acoustic Cryptanalysis, which is a side-channel attacks that exploit a voice that sounded good or not generated during the computation or input-output operations. In the years 2004, Rakesh Agrawal and Dmitri Asonov publish that key on the keyboard and on the telephone and ATM machines is very potential to be attacked by differentiating the sound produced by different keys. Most sources of sound on the keyboard is not uniform in different species, even on the same model. The same or different keyboard that typed by different people can produce a different sound and this complicates the introduction of a button. Many attacks carried out on keyboardPC. This attack was based on the initial hypothesis that the clicking sound between tomboltombol is a little different, though the sound click the button between the different sounds the same in human hearing. This attack is not expensive because the hardware that is used only parabolic microphone and not invasive because it does not require physical intrusion into the system
                                                                                                                    to be continued to /

No comments:

Post a Comment

Related Posts with Thumbnails