Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

seo Introduction to modern Cryptography 2013

Seo Master present to you:
Hi, so I decided that, as i have the entire week to my self i will put in an introduction to Cryptography, for all who are interested in the subject. I will be updating the post, for the next week with new information and sections on cryptography.

Okay, before we move into the real interesting subjects of cryptography like, key exchange protocols, signatures, certificates, Symmetrical cryptography and Asymmetrical cryptography, hash fictions, and prime numbers. We will first look into the history of cryptography and its origins.

History of the Hidden Language.

During ancient times, when leaders and generals needed to send messages to their troops, with instructions on what they should do. It was very easy for the enemy to intercept those messages , by ambushing supply routs (in modern time its equivalent is the man in the middle attack), So this meant the message was easily read and the enemy would know what the other side was planning. to prevent this from happening there was only two ways of preventing this from happening, First, was to hide the message so that it looks just like a normal every day thing (Steganography). Steganography the art of hiding messages so that it is only known to the person receiving the message that a message is hidden in it, a good example is invisible ink. Now, the Second way was to make the message unreadable for any person who was not the intended recipient. And this is what many did, because unlike stenography encryption could be taught to people easily and could be done with much less resources. so In a war situation teaching generals and messengers how to put cryptography was much more efficient.

Early encryption techniques were rather simple and you yourself may have played with it when you were kids.

Two main cipher system used were:
Transposition cipher
Substitution ciphers


A Transposition cipher uses a very simple method of encryption one of the most popular ones were the scytale, basically the scytale is a piece of wood, on which a strip of paper is wounded up to revel what message. so the person sending the message to some one would have an identical scytale as the other and would wind the paper on it and write the message then unwind the paper and fill the empty space with random words. if another person intercepted the message and used a different size scytale the message would not show.
Problem with this was the sender and the receiver required identical scytale.

A Substitution ciphers is another simple cipher that substituted the actual alphabets with some other alphabets or numbers. The Caesar Cipher is by far the most famous of them all, used a simple shift technique to substitute the alphabets, Used by Caesar himself and the roman empire Eg bellow.

Three shift right →
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

Planetext - Bitcoin is a crypto coin
Ciphertext- Efqzlfk fp x fovmql flfk
Notice there is repetition of the same alphabets that have been substituted.

So, looking at the cipher above you can now encrypt any length of message through substitution, and all the receiver has to know when receiving the message is how many shifts are used.

However all these methods are venerable to cryptanalysis techniques, like a frequency analysis. All a person has to do is count the alphabets and make a note of each of the alphabets and the number of times it appears. In the english language some alphabets appear more that some, using this, we can determine which symbol or alphabet was replaced.

English Letter Frequency


Polyalphabetic cipher

Due to the ease of all these Cipher being broken a new system was requires, one which could not be so easily broken using a frequency analysis. many new ciphers came in and out. One being predominantly used for hundreds of years was the Polyalphabetic cipher on which normal frequency analysis attack method did not work. and it used a key. The Vigenère cipher the best known of them all and its harder cousin Autokey cipher remained one of the most used ciphers during the 15th and the 16th and up to mid 18th century, remained unbroken.

It was a variant of a Substitution ciphers but with multiple shifts and alphabets and also the use of a key made it versatile and impenetrable.

This is how a Vigenère cipher looks like.


Vigenere Cipher

Eg:-

Message - TO BE OR NOT TO BE THAT IS THE QUESTION
KEY - RELATIONS

Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL
Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION
Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY

Notice there is no repetition of the same alphabets that have been substituted .

This kind of ciphers remained active for many hundreds of years and was used widely in Europe and the middle east. However the fate of this cipher system was doomed, when a brilliant man who we all know and admire in the computing world came along, the father of computer Charles Babbage, he broke both the Vigenère cipher and the much harder Autokey cipher.

Tomorrow we will touch upon mechanical ciphers, used in the second world war and then enter the world of modern cryptography, in the digital age.


The Rise of the Machine

The era of the second world war, was the proving grounds for modern encryption methods, ideas and innovation. In my opinion, if it was not for the Mathematicians, code-breakers and revolutionary thinkers, the modern computer age, the internet and space travel would not have been possible at all. The birth of computing devices, to conduct tasks through programmed inputs were all tested and innovated, by codebreakers trying to break the German Enigma code. The use of early computers was at England, in a place called Bletchley park. In fact, the first discovery of modern public key encryption system and early experiments on One Time Pads was done during this time.


World War 2 Machines
Enigma Machine *Germany*(Left)  |  SIGABA *USA* (Middle) |   TypeX *UK*(Right)

World War 2 Machines

During the War the Germans used one of the most successful, mechanical crypto systems called the Enegma machine, it was a rotor cipher machine, similar to a Polyalphabetic cipher but with the difficulty increased by the rotor, if the allies broke the code all the germans did was change the configuration and may be add rotors giving another huge headache for code-breakers.

The US and the UK also used similar machine called the SIGABA and the TypeX. However, a code system that was never broken by the enemy was not mechanical at all, but were the Navajo code talkers who played a vital role in the success in the pacific war theater. There's even a movie called the Windtalkers played by Nicolas Cage although it concentrated more on the nipless cage than the Code talker.


Modern Cryptography

With progress happening in the Cryptography community one of them was by far the most revolutionary, the public key crypto system, the RSA algorithm that allowed people to have two keys one public and one private. this solved many problems of key transfer and security and validity of a encrypted message. This algorithm was already made during the second world war, but was classified. Until 1977 when a group in MIT rediscovered this algorithm on their own, hence the name RSA algorithm, the first alphabet of their surname Ron Rivest, Adi Shamir, and Leonard Adleman.
RSA Small Logo

The advent of modern cryptography gave rise to secure communication, safe banking transaction, and greater communication, and social revolution. We use some form of encryption every day and sometimes we don’t even know that encryption is being used.

Cryptography, before the dawn of the Information age was confined to the intelligence community, with many of the technology kept classified and inaccessible to the general public. It was nearly impossible for a person without a connection to the intelligence community, or a large corporation like IBM to do any work on Cryptography. But, that all changed when the internet was born. People from around the world collaborated to bring cryptography to the masses. With the advent of the internet people were able to disseminate information about cryptography, and develop software for everyone to use.

This shift in knowledge from an intelligence based community to a worldwide public community, gave rise to many social changes. With people openly advocating the use of encryption to promote privacy, Bring down corrupt government, safeguard whistleblowers. During the late 80's many BBS's hosted score of text files relating to cryptography and around the early 90's a cypher punk mailing list was started, the birthplace of the cyberpunks, with the major discussion on technical issues, alternative uses of cryptography privacy, government surveillance, freedom of speech, civil society, and related issues. There have been many influential individual who have shaped this movement Eric Hughes, Jim Bell, Philip Zimmermann, Julian Assange just to name a few.

The roots of bitcoin can be traced back to the early discussion, within the cyberpunks and the cryptoanarchistic groups for an anonymous banking system. May be Satoshi Nakamoto might be one of the early cypherpunks, who was able to solve the problem of anonymous banking. But, we shall never know.

Cryptography has now become an integral part of our lives, in this modern day society it is rare not to come across technology that does not utilize some sort of encryption. I believe that the future for Cryptography is bright, because this is the only thing that can solve many of the world problems of secure communication, Tyrannical governments, greedy Banks, and immoral super corporations.

Tomorrow we shall finally talk about the technical part of modern Cryptography. Thinking about what to talk about tomorrow . I am a bit torn about where to start this from, and after a cigarette break I have decided to start with the basis of modern cryptography, the math’s behind it, so the topic for tomorrow would be Prime number related math’s, and will touch upon a Diffie and Hellman key exchange protocol.


The Numbers Game

The building blocks of every thing in maths my opinion is and always, the prime number. This number can form so many different numbers of any length, and a number of a particulate digit can be factorized to a smallest number being prime.

What is a prime number?

A prime number is a number divisible by it self and one. (basic old school definition)
take it this way, a number which cannot be divided equally without creating fractions of it.

2 3 5 7 11 13 17 19 23 29 31 37 41 43 47 53 59 61 67 71...............

so, lets take for example an integer which Factorizes to
56984 = 2 × 2 × 2 × 17 × 419

What is prime factorization?

Prime factors of a positive integer are the prime numbers that divide that integer exactly like the example above.

So why is this useful to cryptography and online security? 

Well the simple fact is that, it is easy to multiply two large prime numbers, but while trying to find the prime factor of that integer become a tedious task taking alot of time
a simple example like.

7703 × 6421 = 49460963

the output a compost number is going to take a long time to be factored, the example above may not be the best example of a large prime number being used but just Imagine a prime number P1 and P2 both the length of about 100 digits long or much longer and multiply those tow together the composite number would be hard to factorize the limit being the time taken to compute the result.

g mod p

42 mod 12 = 10

Working with prime modulus.

3^29 mod 17 = 12

so here calculating this makes it easy when we have the generator as 3 raised to the power 29 . However when we have the result as 12 and need to find 3 raised to the power x . this becomes a time consuming task.

3^x mod 17 = 12

This problem is also know as a discrete logarithm problem. Therefor this creates a One way function. easy to compute harder to decipher.


Therefore, if the size of the prime increases the time taken for a computer to compute the result of that, would take a very long time.

Clock arithmetic :

If we consider prime numbers as the ingredients in our encryption recipe, the modular arithmetic is utensil for cooking it up. we shall see a simple use of [ mod ] in a few examples while talking about the Key exchange protocol especially the Diffie and Hellman key exchange protocol.

Diffie and Hellman key exchange protocol

Problem of Exchanging Keys :-

Lets take an example of two people who are honest employees in a corrupt government service, Alice and Bob, and lets take for example their Evil boss is Eve.

Alice and Bob want to communicate with each other but, does not want any one to read their messages, as they know Eve would most likely be reading their emails.
so how would the two communicate without Eve being able to read their messages.

Firstly, Alice and Bob has to agree on a secret key so that they can use that key to encrypt messages and send to each other but, the problem is that if they send the key without encrypting it , Eve would know what the key is and can read all the messages Alice and bob send each other. This is where the Diffie and Hellman key exchange protocol would be most useful.

So how does it work?
Alice and Bob agree on a generator and a prime modulus.

g = 3
p = 17

What Alice does :-
She chose a random number
and then raises that on the generator, result q = 15

g^x mod p = q
3^54 mod 17 = 15

Alice, then sends this result 15 over the insecure line to Bob

What Bob does
He chose a random number Bob.
and then raises that on the generator, result r = 16

g^y mod p = r
3^24 mod 17 = 16
Bob, then sends this result 16 over the insecure line to Alice

What Alice does is,
uses Bob's result as a generator raised to the power of the random number Alice chose to calculate a secret key s
r^x mod p = s

16^54 mod 17 = 1

Bob also does the same thing using the number Alice sent Bob. to generate a secret key
q^y mod = p = s

15^24 mod 17 = 1

Here Both Bob and Alice was able to compute the secret key s without transmitting the key over the insure line.

Meanwhile, Eve who is reading the messages coming in, can only intercept the following details from Bob and Alice
the generator 'g', prime modulus 'p' and the two results of the calculation by Alice and Bob 'q' and 'r'.

What Eve is missing is the private numbers that Alice and Bob used to generate the Secret 's' . without the 'x' and 'y', it is impossible for Eve to determine what secret key Alice and Bob is using to encrypt their messages.


Alice '(m)' → Bob
s(m)              s(m)


So, here Alice sends Bob an encrypted message using a secret key 's', which Bob then uses the Secret key 's' to decrypt the message Alice Sent him.


As you can see with this protocol many of the problems of secret key transfer is solved. This also leads us to the path of asymmetrical encryption and the use of the later RSA algorithm's public key cryptosystem to encrypt messages.

I hope this was simple to understand, i tried to put in as much details without making it confusing, i hope you all like it and understand. Next, i will cover the public key cryptosystem namely the RSA algorithm, and then touch upon Hashing, one time pads and a few single key encryption on block ciphers.


By subvolatil of Bitcoin Talk Forum!
Original Thead at https://bitcointalk.org/index.php?topic=246307
2013, By: Seo Master

seo Samsung Galaxy S4: Your Ultimate Companion 2013

Seo Master present to you:
The Samsung Galaxy S4 is an upgrade to the world's most popular smartphone Samsung Galaxy S3. It has become the phone to wait for. The phone comes with a bundle of new features, including new camera, sound and shot, it now responds to waves and gestures, new battery etc. It comes with very unique features.


Hardware

The phone weighs 0.1 ounces lesser to its predecessor. It comes with clearest display screen in the market, with 41ppi Super AMOLED HD display. The Galaxy S4 will be equipped with either 1.9 GHz Quad-Core Processor or 1.6 GHz Octa-Core Processor and 2 GB of RAM.

Samsung will be selling three different models of the phone : 16, 32, and 64 GB of internal storage. The microSD slot will support up to 64 GB of additional storage. The phone will be powered by 2,600 mAh battery. The phone is covered by a full 24 month manufacturer's warranty.

Hardware Specifications

  • 41ppi Super AMOLED HD display.
  • 3G (HSPA + 42MB/sec download)
  • 4G (LTE Cat 3 100MB/sec download / 50MB/sec upload
  • 16, 32, 64GB internal storage
  • 2GB of RAM
  • Dual-band 802.11abgn/ac Wi-Fi
  • microSD slot (upto 64GB)
  • 1.6GHz Octa-Core processor/1.9GHz quad-core processor
  • Global Positioning System (GPS)
  • Near Field Communication (NFC)
  • Infrared LED
  • microUSB charger
  • 13-megapixel rear-facing camera/2-megapixel front-facing camera
  • 2,600mAh battery
  • Full HD video Recording
  • Android 4.2.2 (Jelly Bean)
  • 130 Grams
  • 5-Inches Screen

Camera

The phone comes with a new camera. This is one of the most powerful feature of Samsung Galaxy S4. The rear facing camera is 12 MP and the front facing camera is 2 MP.

Dual Shot

The front-facing camera is used to capture images and video, which can be displayed in a small window over the image or video taken by the rear camera. This feature allows the user to take advantage of the both cameras.


Sound & Shot

This is a unique feature of this phone. This feature lets the user tie audio clips with images.

Drama Shot

Drama shots combine a number of photos taken in a sequence to show an action in a single photo. For example, a dog performing antics.


So, thats all about its new camera.


Music Hub

The Samsung Galaxy S4 will be powered by 7Digital Music Hub. The Samsung Galaxy S4 users will have access to over 23 million songs, which can be either streamed or purchased.

Air View

You can hover fingers over the screen to get a preview of certain things from the homescreen, without having to open them.

App free printing

HP and Samsung have partnered to allow Samsung Galaxy S4 to print directly to 180 HP printer models, without configuration. Users can print from their smartphones by connecting both the printer and the handset via the same Wi-Fi network. They can also create a direct wireless link between the phone and the printer.

Smart Pause

The video will stop playing automatically if the user turns away his/her eyes from the screen.

Group Play

This allows the same song to be played back simultaneously through different Galaxy S4 handsets.

Air Gesture

You can scroll the web pages, change the music tracks with the wave of your hand.

Samsung Translator

The phone comes with built-in translation service that can do speech-to-text or text-to-speech in nine languages. The feature does not requires network connection.

Samsung Hub

It is a software by Samsung which offers digital content like Google Play.

Samsung Health

This allows the user to keep a check on heart-rate monitor, calories counter etc.

Samsung Knox

Allows users to keep work and personal data separate on the phone.



The Samsung Galaxy S4 will be available in United Kingdom from 26 April. Walmart will sell the AT&T, Sprint and T-Mobile versions of the phone. Staples will also sell the phone. The phone will be available at other retailers too, including Best Buy, Costco, Target, Radio Shack and Sam's Club.

 You can also buy Samsung Galaxy S4 Cases from a UK retail company.2013, By: Seo Master

seo DDoS attacks played a role in this week's Bitcoin crash says Mt. Gox 2013

Seo Master present to you:
Mt. Gox, a Bitcoin exchange, revealed that a Distributed Denial of Service Attack played a bigger role in the company's decision to suspend trading for 12 hours Thursday than they initially claimed.

"We have two problems: the DDoS and volume related to new accounts," Mt. Gox officials confirmed. "The trade engine is capable of accepting much more of a load. Within 2-3 weeks we will completely rewrite the trade engine, in the meantime we shut down the system today and installed a new server with the current trade engine. Of course, if we didn't have DDoS everything would be fine, so now we're dealing with two issues at once."

Mt. Gox's trading suspension and technical errors drove the price down to a low of $54. JUst few minutes the price was $111.
2013, By: Seo Master

seo Why Ethical Hacking Courses Are in Great Demand 2013

Seo Master present to you:
Have you recently been a victim of cyber hacking? If yes, you are in need of a Certified Ethical Hacker. A Certified Ethical Hacker who will make your online life more secure and impregnable. If technology has produced network evils like hacking, then ethical hacking is the by-product. You heard it right, the term is moral hacking. It sounds like an oxymoron and the jargon may keep you wondering for a while. How can it be hacking, that too ethical at the same time? My article is a brief on why courses on ethical hacking are becoming a compulsion and how it is briskly entering life-online.

Today software companies whether government or private is dealing with hardcore security problems. Crackers and intruders enter databases and web servers for stealing, damaging and spreading of irrelevant programs. This brings in the need of ethical hackers and courses on ethical hacking. Ethical hacking in India is grabbing the market fast and is doing a brisk business. It is the job of ethical hackers to protect the networking infrastructure and corporate websites. These moral hackers have the legal consent to penetrate into a computer or software system by using similar tools and techniques of that of a cracker. But they do not intend to steal information or damage the software system.




Why moral hacking courses are mandatory for survival in the IT Industry?

  • The legal hacking course shapes a professional hacker. To be a successful, professional hacker one should think like a malicious hacker and come up with innovative solutions to protect the corporate networks.
  • These courses teach ethical methods of hacking and are used for the benefits of the I.T. industries.
  • The course teaches penetration testing, detection of vulnerabilities and how to patch those detected loopholes.
How moral hacking courses can be beneficial?

To Students
Legal hacking is a booming career. To take up moral hacking as a corporate career or to become an I.T security professional is a great prospect. Thus legal hacking course is a good opportunity for students aspiring to become network and web security professionals.


To Teachers
For teachers who are already involved in a technical profession and needs a deeper understanding of computer hacking can enroll to the course of legal hacking. They can also teach moral hacking to their own students.

To Professionals
These legal hacking courses can make the professional excel in their career goals by providing them with valid certificates and credentials.

It is high time to be aware on the requirements and utilities of legal hackers to secure life online and offline.


Kylie Taylor is a consistent web article writer and gives authentic information on courses on ethical hacking and Ethical hacking in India. You can get a complete guide for studying ethical hacking and details of courses from Indian school of ethical hacking.
2013, By: Seo Master

seo Why You Need to Monitor Your Network 2013

Seo Master present to you: Your website is the bloodline of your business. You depend on it to be up, active and healthy. You depend on it to work because if it didn't, neither would your business. And now that your competition is literally a click of the back button away, your customers can and will go some place else if they can't get what they need from your website. In addition to pleasing your client base, if you're selling third-party products, your own products, or even advertisements on your website, proving that you have 99% uptime is a huge selling point. Shouldn't you be doing everything you can to keep that website up and running?

Website downtime caused by network outages cost business about $1.7 billion each year. When you consider how simple it is to prevent outages from happening, you have to wonder why you let it get that high in the first place. So, what are you options?

You could have staff in-house IT 24x7, but that cost can get pretty pricey. You could also do it yourself, but that just puts all of the weight on your shoulders, in addition to the weight of running your actual business. That means you're the one getting those 4 a.m. phone calls from someone saying your website is down, and you're constantly tied to your cellphone or computer to make sure connectivity is happening all day and all night. Bluntly put, it's practically impossible to monitor your own network and run your business at the same time.

Your next best bet is open source and free monitoring tools. (A good list of options can be found here.) These include Monit, Ganglia and Munin but remember: these are just here for aid. Every free tool does provide different functionality, so you'll want to figure out what you actually need it for before making a signing up. And while they can help you through a lot of sticky messes with outages, you do get what you pay for, and with free tools, you're not getting the support you may need.
The most robust option, outside of staffing in-house, is outsourcing your network operations center so you have more free time and man power to focus on actually running your business.

Due to a lack of in-house IT staff who can offer 24×7 service, some small business owners have to shoulder this weight themselves. While monitoring it yourself may seem easier at first glance, it takes a lot of man power. You’ll be tethered to a computer or cell phone, constantly monitoring their business’ networks and connectivity at all hours of the day — and night. There are some open source and freeware server/network monitoring tools that can take some of the weight off, but they’re just there for aid. Six Revisions posted a great list of free tools such as Monit, Ganglia, and Munin that can be used as a starting point for your research. Each provided different functionality, so be sure to find one that offers services based off of your needs.

Still, while these tools are a great aid, you get what you pay for, and the free open-source software monitoring won’t come with the support that an outsourced provider does for you. Outsourcing this responsibility frees up man power that can be directed toward running the business. This service also ensures the business does not suffer from downtime or outages due to server crashes or connectivity problems.

Companies like iGLASS Networks provides NOC services for small business, large coporations, and cable and telecom companies. Its network monitoring services reduce your downtime, intercept bugs, and alert key people in your company before the minor issue becomes a major problem. Outsourced NOC companies monitor basic functionality and DNS blacklisting, SMTP servers, VoIP services, and even available content.

There are a number of different ways you could go to keep your website healthy, so you do need to sit and weigh your pros and cons before making a decision. Still, the most important this is getting something in place so you're not stuck with an offline website during your highest traffic period.

By Erin Everhart2013, By: Seo Master

seo NASA's Alien Planet Archive Now Open to the World 2013

Seo Master present to you: Scientists with NASA's planet-hunting Kepler spacecraft have revamped the mission's online archive of alien worlds, opening up the database for the entire world to see. Researchers are now posting all exoplanet sightings by the Kepler observatory into a single, comprehensive website called the NASA Exoplanet Archive. Instead of going through the long planet confirmation process before making data publicly available, since December of last year, scientists have started shoveling out all the data Kepler collects into a comprehensive list. "When we make that list, right away it goes to the archive," Kepler mission team member Steve Howell told SPACE.com during the 221st American Astronomical Society meeting in Long Beach, Calif., this month. "So the day we know about the list, the archive knows about the list. And then everybody, including us, can work on that list. But that list is dynamic so if we, or a community person, makes an observation and says, 'Hey, I looked at this planet candidate but it's really an eclipsing binary,' then that entry in the archive will be changed." The archive has information about the size, orbital period and other metrics of any possible planet discovered and investigated by Kepler. "It's all in real time," Howell said. "The sausage-making process is exposed." Before the new archive was debuted, astronomers were already doing creative work with the data. One created a visually stunning video of every known Kepler planet candidate — 2,299 unconfirmed exoplanets at the time — orbiting one central point. The Kepler team’s new "open" attitude toward data release is giving everybody, not just members of the scientific community, a chance to do some hands-on scientific research by building their own experiments, Howell said. A group of high school students has already taken data from groups of planets observed by Kepler and mapped them against a map of known stars looking for a pattern. Howell doesn’t think they'll see much, but he's glad that they have the opportunity to get creative. "The entire world can help us with this Kepler data," Howell said. "I don't see any downside." Planet Hunters, a collective of amateur astronomers, recently found 42 new alien planets using Kepler data that was publicly available prior to the launch of the new archive system. It would be difficult for Kepler scientists to get their jobs done without the help of amateur astronomers around the globe, mission researchers said. By making the exoplanet archive more accessible, it could mean that more planets are found and confirmed in shorter amounts of time than ever before. More people sifting through the wealth of data collected by Kepler means that scientists have a better chance of finding even more planets circling distant stars, Howell added. Since its launch in 2009, NASA's Kepler spacecraft has flagged more than 2,300 objects as possible alien worlds. Although only about 100 have been confirmed, scientists expect that at least 80% could be certifiable exoplanets. Currently, Kepler has entered a "safe mode" after researchers spotted an issue with one of the spacecraft's three reaction wheels that are responsible for orienting the telescope. The malfunction has stalled science observations, but researchers hope that the issue will be resolved by Jan. 27. Image courtesy of NASA2013, By: Seo Master
Powered by Blogger.