05 December 2011

An Overview of Cryptography

The history of cryptography begins thousands of years ago. Cryptography is one of the oldest fields of technical study we can find records of, going back at least 4,000 years, was used in the field of defense and military. The first use of the encryption process for the transmission between sectors of the army are of the Pharaohs. It was also mentioned that the Arabs have attempted in the field of ancient encryption. And Chinese used many ways in the science of cryptography and encryption for the transfer of messages during the war. It was their intent from the use of encryption is to hide the true form of the messages even if they fell into the hands of the enemy, it was difficult to understand. The best way used in the old was Julius Caesar one of the Roman emperors. In the present age has become an urgent need to use this knowledge "encryption" and it was connected to the world interconnected via open networks. Since these networks are used to transfer information electronically, both among ordinary people, or between public and private organizations, whether military or civilian. Must be ways to preserve the confidentiality of information. Has made great efforts from all over the world to find the best ways in which they can exchange data with the possibility of non-disclosure of such data.(Washington & Trappe, 2002)


What's the meaning of Cryptography? The word comes from very old Creek, and is the union of two words: krypto="hidden" & grafo="to write" . so the literal meaning is "hidden writing": is the process of how to make that you write obscure , unintelligible to everyone except whom you want to communicate with. (History of Cryptography, 2010)

What's the objective of Cryptography? Confidentiality, Data Integrity, Authentication and Non-repudiation.

How Cryptography works? Cryptography algorithm is a mathematical function used in the process of encryption and decryption. It works in combination with the key or password, number or phrase to encrypt the text readable and security of the encrypted data depends on two important strength of the encryption algorithm and secret key.

How many type Cryptography? There are two type of Cryptography: Conventional Cryptography and Public Key Cryptography.
  1. Conventional Cryptography: Also called secret-key or symmetric-key encryption, one key is used both for encryption and decryption. Examples of Conventional Cryptography systems are Caesar's Cipher, Data Encryption Standard. Figure 1 is an illustration of the conventional encryption process.(Conventional Cryptography, 2010)

      Figure 1: Conventional Cryptography process


  2. Public Key Cryptography: Also called symmetric encryption (Cryptography Symmetric). It uses a single key to the process of encryption and decryption of data. This depends on the type of secret encryption key used. As the person who has the decryption key can read the content of messages or files. An example of this; if X wanted to send an encrypted message to the Y, upon finding a safe way to send the key to the Y. If you got any third party on this key, they can read all encrypted messages between X and Y. Examples of Public Key Cryptography systems: DSA ,PGP, RSA. Figure 2 is an illustration of the Public Key Cryptography process.(More about Public Key Infrastructure (PKI), 2010)

  Figure 2: Public Key Cryptography process

Advantages and disadvantages of conventional cryptography and cryptography using the public key: Conventional cryptography is much faster than Public Key Cryptography by using modern computer, but it uses only one key. It is more likely to be breakthroughs. The public key cryptography keys is used in the process of encryption and decryption, which is stronger and less prone to breakthroughs, but it is slower than conventional encryption. As a result of these advantages and disadvantages of modern systems now use both methods, where they use the conventional method of encryption and the secret key exchange between the parties per multicast is done through the use of public key encryption method.

Conclusion: Cryptography is giving great interest, since it provides privacy and security of all concepts of data transmitted over open networks. Thus an urgent need for strong encryption methods because with the rapid development of computer, it reduces the strength of encryption, because the increased speed of the computer means shortening the time it takes the computer to break the encryption key or detect a specific encryption key .


References:
  • Washington, L. C., & Trappe, W. (2002). Introduction to Cryptography: With Coding Theory. NJ, USA: rentice Hall PTR Upper Saddle River.
  • More about Public Key Infrastructure (PKI). (2010). Retrieved 12 4, 2011, from Petri IT Knowledgebase by Daniel Petri: http://www.petri.co.il/public_key_infrastructure_pki.html
  • Conventional Cryptography. (2010). Retrieved 12 4, 2011, from ORACLE ThinkQuest - Education Foundation: http://library.thinkquest.org/C0126342/secret.htm
  • History of Cryptography. (2010). Retrieved 12 4, 2011, from Logical Security: http://shonharris.net/resources/whitepapers/Cryptography.pdf

Figures:

  • Figure 1: Conventional Cryptography process, 2011,retrieved from http://www.calsoftlabs.com/whitepapers/windows-media.html
  • Figure 2: Public Key Cryptography process, 2010,retrieved from http://www.data-processing.hk/glossaries/encryption/

14 November 2011

Broadband over Power Line

Broadband over Power Line (BPL) is a system that provides high-speed internet into home and office by means of electrical outlet. Theoretically, BPL has the ability to enable data to be transmitted over power lines into homes and offices systematically. BPL is also called Power-line Communications (PLC).(Christian, 2004)

How BPL Works? The below image shows how the electricity is distributed to the end-users at home. First, electricity generates power from the power plant. Second, the power is transferred by using high voltage transmission lines to power substation inorder to reduce the power of the voltage to medium. Third, it passes to power poles using low-voltage line to deliver safely the needed power to start up BPL at home.

 
Figure 1(example of how the power dilivered to our home, 2011).

The transmission of line is not simply diffusing electricity to pass the data at home because it carries high voltage. The voltage of transmission is broke down into medium yet safe mode to be able to transmit the data safely at home by power poles. The BPL uses Substation (Medium-Voltage) which is suitable for data transmission. The data travel from one point to another point by using special device called coupler. The repeater take the data until it reaches the last station which is the home.BPL modems connect the power socket in the building to access BPL RF signal. It converts the RF signal to digital data and vice-versa. The process on how to connect using BPL modem are: 1) End-user connects the BPL modem to any power socket in the building or at home to access the BPL RF signal; 2) The BPL modem converts the RF signal back into digital data; 3) End-user then connects the BPL modem into a computer, server, switch, or wireless access point (Valdes).


Figure 2(example of how data traval by using power line, 2011).


The applications for Broadband over Power Line systems are divided into two broad categories:

1. In-house BPL, this application allow you to use traditional channels: telephone or cable broadband to access internet on all parts of your home by using power outlets. You simply plug the Ethernet lead from your normal modem into a special adapter that fits into one of the power outlets. The home electricity circuit takes the broadband to and from every room in your home as a high-frequency signal superimposed on top of the power supply. If you want to use broadband to any parts in your home, you simply plug another Ethernet adapter into one of the power outlets in that room and plug your computer into it.
2. Access BPL,it provides communications between homes and ISP outside the home by using the power outlet within the home or by using the access point attached within power poles through wireless devices.

BPL is already being tested in several cities around the United States and the United Kingdom. In these places, network and infrastructure are already in place.  Applying BPL elsewhere is a cost-effective type data transmission since almost hundred percent anywhere has electricity. It empowers the community to be in touch with the world e.g. using voice, data, internet. Moreover, it helps technical people build WAN, MAN and LAN without spending extra cost. On the otherhand, BPL has its downside, it never get the chance to be materialized since its application is always in the pilot stage. Although some areas have electricity but it does not guarantee stability.


References:

Christian, D. (2004). What is Broadband over Power Line (BPL). Retrieved 11 08, 2011, from SearchNetworking: http://searchnetworking.techtarget.com/definition/Broadband-over-Power-Line

Valdes, R. (n.d.). How Broadband Over Powerlines Works. Retrieved 11 08, 2011, from howstuff works: http://computer.howstuffworks.com/bpl3.htm


Figures:

Figure 1:example of how the power dilivered to our home, 2011,

Figure 2:example of how data traval by using power line, 2011,

03 October 2011

What is SharePoint® 2010?

It was a humble beginning for the SharePoint before it became the most sought organizer by facilitating the sharing and managing of information for business purposes.

SharePoint is an integrated web application which was launched in 2001. Years of development of upgraded version of it lead to the convergence of the business intelligence vendor and tool vendors. In 2003, Microsoft launched "SharePoint portal server 2003".

These products and the development during those years for SharePoint derived another version became called "Microsoft Office SharePoint Server 2007" in end of 2006. Understanding the needs of the business and the development lets the Microsoft to acquired ProClarity, a business intelligence (BI) vendor, and Groove, a peer-to-peer collaborating tool vendors. In 2007, Microsoft released Performance Point, a BI solution that was integrated with SharePoint. (Holland (2011))

"SharePoint is a platform or suite of services that enables a team of information workers to easily collaborate and work together better by facilitating the development, sharing, and management of information, and the tracking and management of business processes"(Marty & Nancy (2010))

SharePoint 2010 helps you and your team work better, faster, and smarter. It helps your team access the right information at the right time for better decisions and get the job done successfully. Moreover,  with the help of SharePoint 2010 you can work comfortably and confidently because it has familiar interface and can connect directly to Microsoft Office.

SharePoint provides powerful customizable web applications and set of built-in applications that helps any organization to improve their team works, collaboration and even create paper-less environment. 
The vital advantage of SharePoint is the compatibility with other office applications ( Outlook , Word, excel…. ).

What Can SharePoint do? 
Microsoft divides SharePoint to six areas: 
  1. Sites: Gives you the ability to create department, team or your own website within your organization. The simple steps do not require you to be developer or undergo special program. It also gives you the ability to manage the contents in your site.
  2. Communities: Helps you work with other people through shared calendar, task list, issue list, dissuasion board , wikis , Workspace. As a general, it gives you the freedom to work with other people using the same documents. The idea of collaboration is built-in these things.
  3. Content: Provides you in control of contents through citrine permission and privileges. Working seamlessly instead of putting content in local drive; can share it with other in your organization. 
  4. Search:Let you search using super search techniques.
  5. Insights: Organize your information for better understand by acquiring it from different source and gives you the ability to present your knowledge using dashboard and scorecard 
  6. Composites: Extends your work through built-in tools that does not require you to be a developer. 

What are the Components of SharePoint? 
  • SharePoint Foundation 2010:
    Download for free and is under the server’s license model.
  • Microsoft SharePoint Server 2010:
    Install added components, costs about a thousands of dollars (depending on volume license) and requires at least one Client Access License (CAL) for each user.

Two core tools for SharePoint needed by developers: 
  • SharePoint Designer 2010:
    Developer main tool for SharePoint, it is an Integrated Development environment that manages SharePoint.
  • Visual- Studio 2010:
    As alternative tool for SharePoint Development , this is needed to install the SharePoint extension for VS 2010.

What is the minimum hardware and software required to implement SharePoint 2010? 
There are different requirement based on the type of implementation and the organization size. For more information about that please refer to the following link:Hardware and software requirements (SharePoint Server 2010)

Training Resource:

References:
  1. http://sharepoint.microsoft.com/en-us/product/benefits/end-user/Pages/default.aspx
  2. Matthews , Marty & Buchanan, Nancy (2010) Microsoft SharePoint 2010 Quicksteps. McGraw-Hill)
  3. http://msdn.microsoft.com/en-us/library/ee210640.aspx
  4. Charlie, Holland (2011)The Complete Reference: Microsoft® SharePoint 2010 Web Applications. McGraw-Hill