Вы находитесь на странице: 1из 4

Authentication Text Source Using

Rail Fence Cryptography Technique


Andysah Putera Utama Siahaan
Universitas Sumatra Utara
Jl. Dr. Mansur No. 9, Medan, Sumatra Utara, Indonesia
andysahputrautamasiahaan@yahoo.com

Abstract — This paper presents the basic principle of using inapplicable, insufficient or uneconomical, and other
rail fence cryptography in authenticating data. Special techniques must be employed. Central among these techniques
outline is put on showing the relationships among several is cryptography: the use of transformations of data intended to
method of cryptography model.. Other sections cover make the data useless to one's opponents. Such
other the important methods such as converting to cipher transformations provide solutions to two major problems of
text, recovering to plain text, and provide references to data security: the privacy problem, preventing an opponent
significant work on cryptography. Recent advances in from extracting information from a communication channel,
cryptography are also briefly discussed. and the authentication problem, preventing an opponent from
injecting false data into the channel.
Keywords — cryptography, cipher, plain, algorithm,
computer In telephone communication the problem of authentication
I. INTRODUCTION predominates, since the called party cannot determine who is
calling. Eavesdropping, which requires the use of a wiretap, is
Until now, cryptography has been an interest lesson to technically more difficult and legally more hazardous than
learn. Cryptography is primarily used by military and calling and pretending to be someone else. In radio
diplomatic communities. Private individuals and even communication, the situation is reversed. Eavesdropping is
commercial organizations have rarely considered it necessary passive and involves scant legal hazard, while injection
to support the protection of their communications. Today, exposes the illegitimate transmitter to discovery and
however, several factors have combined to stimulate great prosecution. Sometimes it is sufficient to authenticate that a
interest in commercial applications. Electronic devices are message has not been modified by a third party. At other
replacing paper media in a rapidly increasing variety of times, it is important for the receiver to be able to prove that
applications. The effect of this is both to increase the amount he actually received the message from the sender and that he
and variety of information available to an eavesdropper, and has not modified it or originated it himself. The problem of
to make the act of eavesdropping easier. Fortunately the same dispute is to provide the recipient of a message with legal
factors which promote the spread of electronic proof of the identity of the sender. On channels used for
communications are producing, a marked decrease in the cost electronic funds transfer or contract negotiation, it is
of cryptography. important to provide the electronic equivalent of a written
signature, in order to settle any dispute between the sender
Where once the nation's business was conducted either by and receiver as to what message, if any, was sent. The
personal contact or written correspondence, it is now handled problems of privacy and authentication are closely related and
largely over the telephone, creating the environment for a techniques for solving one can frequently be applied to the
substantial wiretapping industry. The replacement of wires by other. This paper examines the problem of privacy first
microwaves has even allowed the wireman to ply his trade because it is the older, the more widespread, and the more
without having to tap any actual wires. Finally, the familiar of the two.
introduction of direct long distance dialing has made it
possible to identify calls of interest even when the tap is III. AUTHENTICATION
placed a long way from the person being spied upon, because
each call is preceded by a digital sequence identifying the Authentication is the act of establishing or confirming
number being called. something (or someone) as authentic, that is, that claims made
by or about the subject are true. This might involve
II. BASIC CONCEPT confirming the identity of a person, tracing the origins of an
artifact, ensuring that a product is what its packaging and
When valuable or secret data must be saved or transmitted, labeling claims to be, or assuring that a computer program is a
they are frequently protected physically through the use of trusted one.
safes, armed couriers, shielded cables, and the like. As
electronic forms of communication and storage take over from
their predecessors, however, such measures often become
A. Authentication Method other identifying feature which aids consumers in the
identification of genuine brand-name goods.
In art, antiques, and anthropology, a common problem is
verifying that a given artifact was produced by a certain B. Authentication Factors and Identity
famous person, or was produced in a certain place or period of
history. The ways in which someone may be authenticated fall into
three categories, based on what are known as the factors of
There are two types of techniques for doing this. The first is authentication: something you know, something you have, or
comparing the attributes of the object itself to what is known something you are. Each authentication factor covers a
about objects of that origin. For example, an art expert might range of elements used to authenticate or verify a person's
look for similarities in the style of painting, check the location identity prior to being granted access, approving a transaction
and form of a signature, or compare the object to an old request, signing a document or other work product, granting
photograph. An archaeologist might use carbon dating to authority to others, and establishing a chain of authority.
verify the age of an artifact, do a chemical analysis of the
Security research has determined that for a positive
materials used, or compare the style of construction or
identification, elements from at least two, and preferably all
decoration to other artifacts of similar origin. The physics of three, factors be verified.[1] The three factors (classes) and
sound and light, and comparison with a known physical some of elements of each factor are:
environment, can be used to examine the authenticity of audio
recordings, photographs, or videos.  the ownership factors: Something the user has (e.g.,
wrist band, ID card, security token, software token,
Attribute comparison may be vulnerable to forgery. In phone, or cell phone)
general, it relies on the fact that creating a forgery
indistinguishable from a genuine artifact requires expert  the knowledge factors: Something the user knows
knowledge, that mistakes are easily made, or that the amount (e.g., a password, pass phrase, or personal
of effort required to do so is considerably greater than the identification number (PIN), challenge response (the
amount of money that can be gained by selling the forgery. user must answer a question))
In art and antiques certificates are of great importance,
authenticating an object of interest and value. Certificates can,  the inherence factors: Something the user is or does
however, also be forged and the authentication of these pose a (e.g., fingerprint, retinal pattern, DNA sequence
problem. For instance, the son of Han van Meegeren, the well- (there are assorted definitions of what is sufficient),
known art-forger, forged the work of his father and provided a signature, face, voice, unique bio-electric signals, or
certificate for its provenance as well; see the article Jacques other biometric identifier).
van Meegeren. Criminal and civil penalties for fraud, forgery,
and counterfeiting can reduce the incentive for falsification,
depending on the risk of getting caught. C. Authentication vs. Authorization

The second type relies on documentation or other external The process of authorization is sometimes mistakenly
affirmations. For example, the rules of evidence in criminal thought to be the same as authentication; many widely
courts often require establishing the chain of custody of adopted standard security protocols, obligatory regulations,
evidence presented. This can be accomplished through a and even statutes make this error. However, authentication is
written evidence log, or by testimony from the police the process of verifying a claim made by a subject that it
detectives and forensics staff that handled it. Some antiques should be allowed to act on behalf of a given principal
are accompanied by certificates attesting to their authenticity. (person, computer, process, etc.). Authorization, on the other
External records have their own problems of forgery and hand, involves verifying that an authenticated subject has
perjury, and are also vulnerable to being separated from the permission to perform certain operations or access specific
artifact and lost. resources. Authentication, therefore, must precede
authorization.
Currency and other financial instruments commonly use the
first type of authentication method. Bills, coins, and cheques For example, when you show proper identification
incorporate hard-to-duplicate physical features, such as fine credentials to a bank teller, you are asking to be authenticated
printing or engraving, distinctive feel, watermarks, and to act on behalf of the account holder. If your authentication
holographic imagery, which are easy for receivers to verify. request is approved, you become authorized to access the
Consumer goods such as pharmaceuticals, perfume, fashion accounts of that account holder, but no others.Even though
clothing can use either type of authentication method to authorization cannot occur without authentication, the former
prevent counterfeit goods from taking advantage of a popular term is sometimes used to mean the combination of both.
brand's reputation (damaging the brand owner's sales and
reputation). A trademark is a legally protected marking or
IV. IMPLEMENTATION IN RAIL FENCE CRYPTOGRAPHY

Rail Fence Cipher generally refers to a form of


transposition cipher. It derives its name from the way in which
it is encoded. In the rail fence cipher, the plaintext is written
downwards and diagonally on successive "rails" of an
imaginary fence, then moving up when we reach the bottom
rail. When we reach the top rail, the message is written
downwards again until the whole plaintext is written out. The
message is then read off in rows.

Rail Fence Cipher is also called Zig Zag Cipher. The term
Zigzag cipher may refer to the Rail Fence Cipher as described
above. However, it may also refer to a different type of cipher
system that looks like a zigzag line going from the top of the
page to the bottom. As described in Fletcher Pratt's Secret and
Urgent, it is "written by ruling a sheet of paper in vertical
columns, with a letter at the head of each column. A dot is
made for each letter of the message in the proper column,
reading from top to bottom of the sheet. The letters at the head
of the columns are then cut off, the ruling erased and the
message of dots sent along to the recipient, who, knowing the
width of the columns and the arrangement of the letters at the
top, reconstitutes the diagram and reads what it has to say.

Below is the illustration:


REFERENCES

Robert Stinson, Douglas. “Cryptography: theory and practice”,


Chapman & Hall/CRC. 2006.
http://en.wikipedia.org/wiki/Transposition_cipher, access time : April,
10th , 2011.
http://en.wikipedia.org/wiki/Topics_in_cryptography, access time : April,
10th , 2011
http://en.wikipedia.org/wiki/Cryptography, access time : April, 10th ,
2011.
http://www.cryptogram.org/cdb/aca.info/aca.and.you/chapter_09.pdf#RA
ILFE, access time : April, 10th , 2011.
http://en.wikipedia.org/wiki/Rail_fence, access time : April, 10th , 2011.

Вам также может понравиться