#Part 1

Nowadays, information and communication technology is one type of technology that is developing very rapidly. Communication and information technology is also one type of technology that is ranked top, both in terms of positive, negative, to its use.

One of them is a computer. The computer it self is a technological machine with operating system control accompanied by programs capable of receiving and storing data, processing and delivering results in the form of information according to the formulated operating procedures. One component of a computer system is software.

Understanding software according to Roger S. Pressman (2002), Pressman said that what is meant by software or software is a program command in a computer, which if executed by the user will provide the functions and performance as expected by the user. This statement illustrates that this software serves to give computer commands, so that the computer can function optimally, in accordance with the wishes of the user who gave the command.

Indeed, as a rapidly developing technology, surely information and communication technology has several advantages and disadvantages. Some are aware, and some may not be aware, one of which is information security.

Now this information security issue is a very important aspect. Unfortunately, often these security issues do not get the attention of the owners and managers of an information system. Often security issues are forgotten in matters that are considered important.

At present information has become a very important commodity. The ability to access and provide information quickly and accurately becomes essential for a company, both information in the form of commercial, tertiary institutions, government institutions, and individual information. In the development of information it is very possible the development of computer and telecommunications technology will be more rapid.

The importance of information is often that some information may only be accessed by certain people. Even information that falls into the hands of other parties can cause harm to the owner of the information.

This section will explain about cryptographic-based software that is generally used.

CRYPTOOL

CrypTool is an open source project. The main result is free e-learning software. CrypTool which describes the concepts of cryptography and cryptanalysis. CrypTool is the most widely spread e-learning software in the field of cryptology.

CrypTool implements more than 300 algorithms. Users can adjust this with their own parameters. The graphical interface, online documentation, analysis tools and CrypTool algorithm introduce users to the field of cryptography. CrypTool contains most classic ciphers, as well as modern symmetric and asymmetric cryptography including RSA, ECC, digital signatures, hybrid encryption, homomorphic encryption, and Diffie-Hellman key exchange. Methods from the quantum cryptographic area (such as the BB84 key exchange protocol) and the post-quantum cryptographic area (such as McEliece, WOTS, Merkle-Signature-Scheme, XMSS) are applied. Methods (eg Huffman code, AES, Keccak, MSS) are visualized.

It also contains: didactic games (such as Number Shark, Divider Game, or Zudo-Ku) and interactive tutorials on prime numbers, basic number theory, and lattice-based cryptography.

The development of CrypTool began in 1998. Originally developed by German companies and universities, this is an open source project since 2001. More than sixty people around the world regularly contribute to the project. Contributions as software plugins come from universities or schools in the following cities: Belgrad, Berlin, Bochum, Brisbane, Darmstadt, Dubai, Duisburg-Essen, Eindhoven, Hagenberg, Jena, Kassel, Klagenfurth, Koblenz, London, Madrid, Mannheim, San Jose, Siegen, Utrecht, Warsaw.

At present 4 versions of CrypTool are maintained and developed. The CrypTool 1 (CT1) software is available in 6 languages ​​(English, German, Polish, Spanish, Serbian, and Greek). A project for the French version began in late 2013. CrypTool 2 (CT2), JCrypTool (JCT) and CrypTool-Online (CTO) are available in English and German.

The aim of the CrypTool project is to make users aware of how cryptography can help fight network security threats and to explain the basic concepts of cryptology.

The latest release version of CT1, CrypTool 1.4.30, was published in August 2010. This book is written in C ++ and is designed for the Microsoft Windows operating system. Port CrypTool 1 to Linux with Qt4 started, but there is currently no progress.

In 2007, development began on two additional projects, both based on pure plugin architecture, to be the successor to the original CrypTool program. Both successors regularly publish stable new betas:

CrypTool 2 (built with C # / .NET / WPF) (abbreviated CT2) uses the concept of visual programming to clarify the cryptographic process. At present CT2 contains more than 100 crypto functions.

JCrypTool 1.0 (built with Java / Eclipse / RCP / SWT) (abbreviated as JCT) runs on Windows, Mac OS, and Linux, and offers a document-centric and function-centric perspective. At present JCT contains more than 100 crypto functions.

CrypTool has received several international awards as an educational program, such as the 2004 TeleTrusT Special Award, EISA 2004, the NRW IT Security Award 2004, and the Selected Landmark in the Land of Ideas 2008.

CRYPTLIB

Cryptlib is an open source cross-platform software toolkit. Distributed under the Sleepycat License, free software license that is compatible with the GNU General Public License. As an alternative, cryptlib is available with a standard commercial license for those who prefer to use it on commercial terms.

Cryptlib is a security toolkit library that allows programmers to enter encryption and authentication services into software. It provides a high-level interface so that strong security capabilities can be added to the application without the need to know many details of low-level encryption or authentication algorithms. It comes with more 400 page programming manuals.

At the highest level, cryptlib provides full security service implementations such as secure S / MIME and PGP / OpenPGP security sessions, SSL / TLS and SSH, CA services such as CMP, SCEP, RTCS, and OCSP, and other security operations. as secure timestamping Because cryptan uses the standard X.509, S / MIME, PGP / OpenPGP, and standard SSH / SSL / TLS formats, encrypted or signed data can be easily transported to other systems and processed there, and cryptlib itself runs on many operating systems – all versions of Windows and most Unix / Linux systems. This allows e-mails, files and EDI transactions to be authenticated with digital signatures and encrypted in an industry standard format.

Cryptlib provides other capabilities including full handling of X.509 / PKIX certificates (all versions of X.509 from X.509v1 to X.509v4) with SET certificate support, Microsoft AuthentiCode, Identrus, SigG, S / MIME, SSL, and Qualified, Chain PKCS certificate # 7, handling certification requests and CRLs (certificate revocation lists) including automatic certificate checking of CRLs and online checks using RTCS and OCSP, and issuing and revoking certificates using CMP and SCEP. It also implements various certification authority (CA) functions providing a complete CMP, SCEP, RTCS and OCSP server implementation to handle online certificate registration / revocation and certificate status checking. In addition to certificate handling, it provides a sophisticated key storage interface that allows the use of various types of key databases ranging from PKCS # 11 devices, PKCS # 15 key files, and PGP / OpenPGP key chains to RDBMS ‘commercial classes and LDAP directories with SSL protection optional.

0/5 (0 Reviews)

LEAVE A REPLY

Please enter your comment!
Please enter your name here