Professional Documents
Culture Documents
NUMERICAL THEORY
CREATED BY :
ZULFAN (4163312034)
B. Purpose
Can make the idea of new ideas of discrete mathematics
relationship with the use of cryptography.
THEORY NUMBER OF APPLICATIONS IN DAILY LIFE
Smart cards are the most popular memory cards and microprocessor cards. Memory card
is similar to a floppy disk, whereas the microprocessor card is similar to a small computer with
the operating system, security, and data storage. Smart cards have several types of interfaces
(interfaces) are different. Common type of interface is the contact interface, which in this case a
smart card inserted into the reader (card reader) and physically physical contact between the tool
and the card (Figure 1.4).
Smart cards store private keys, digital certificates, and other information. Smart cards also
store credit card numbers and personal contact information (telephone number). Certificates are
digitally signed by the card issuer (CA) to certify the public key owner of the card.
The use of smart cards combined with a PIN (Personal Identification Number). So, there
are two levels that must be on the use of smart cards, which have the smart card itself and know
the PIN to access information stored on the card. Computer server authenticates the card by
sending a value or string (called a challenge) to the card to be signed using the private key (stored
in the card), then the signature is verified by the machine using the public key owner of the card.
Computer server needs to store the card issuer's public key to validate digital certificates.
Many mobile devices that use a smart card for authentication. But the smart card still does
not guarantee total safety. If the mobile device is lost or stolen, digital certificates and private keys
in the smart card (contained in the equipment) could potentially be accessed by thieves to access
confidential information. Cell phones with GSM technology has an integrated smart card in the
phone. Own mobile phone has the option to set a PIN for added protection, so that if the phone is
lost or stolen, the phone can not be used without knowing the PIN.
Smart cards Wireless Identity Module (WIM) included in the Wireless Application
Protocol (WAP). WIM card protects mobile communications and transactions with digital
signatures. WIM card provides security for digital certificates, management of PIN codes, keys
and digital signatures. WIM store the encryption algorithms are required in the smart card. All
functions necessary for system security and privatization incorporated into smart cards.
The encryption algorithm used is DES in ECB mode. Because DES works by encrypting
block 64-bit, then the PIN which only consists of four digits (32 bits) must be coupled with padding
bits so that the length to 64 bits. Padding bits are added different for each PIN, depending on
additional information on each ATM card [PIN02].
Because the PIN is only 4 digits long, the opportunity is huge predictable. Someone who
obtain an ATM card stolen or lost can try all possible PIN codes are possible, because there are only
10 10 10 10 = 10,000 possibilities 4- digit PIN code. To resolve this problem, most ATM's only
allow pengentry maximum PIN three times, if 3 times remains one of the ATMs will 'swallow' ATM
card. This problem also shows that cryptography is not always able to solve the problem of data
security.
Some ATMs now use a smart card to enable the use of public key cryptography. ATM card
containing the user's private key and digital certificate signed by the card issuer (CA) to certify his
public key. ATM card authenticates by sending a string to the card to be signed using the private key,
and the signature is verified by using the public key ATM card owners. As with all systems based on
digital certificates, ATM terminal needs to have a copy of the public key card issuer with a view to
validating digital certificates. This is realized by installing a public key into the ATM machine.
From the description above paper, we can conclude that the theory of discrete mathematics
especially integers has a very close relationship with the science of cryptography as described above.
Because of the past decade working digital computer discretely or continuously progressing very
rapidly, then the discrete mathematics and cryptography are also experiencing rapid development
directly because there is a close relationship between the two.
Cryptography in Indonesia called coding which briefly may mean art protecting data and
information from the parties that do not demand either when transmitted and when it is stored. While
the science of password called cryptology namely the study of how the technique to protect data and
this information along with the entire crop. Users are given an ID and password to access the system.
The password is encrypted to prevent unauthorized access to the system, for example the theft of
sensitive data by those who are not entitled. To get this encryption not needed because the cost has
been published in general. Therefore, it can be concluded that the cryptography is still an effective
system in terms of security and protection and can be widely used in various fields of business and
technology In this case we find its application in everyday life one example mentioned in the
Transaction In ATM.
It may be said that human life is surrounded by cryptography and discrete mathematics.
Therefore, as human beings who live in this modern age, we expected to be able to develop at least
understand both the science.