ITC 382 Client Server Applications                 Assignment 1

CLIENT SERVER APPLICATIONS

ITC 382

Assignment 1

                                                                                                                     Prepared By:


Contents


1. Journal

Topic: Pretty Good Privacy (PGP)

Author: Wong Sye Keit

Perspective: This is the first assignment in the client server applications subject. On this assignment we are suppose to choose a topic of interest (related to client/server) and write two reports on it, a non technical and a technical report. After much research I decided to write on a subject related to security. I scope this topic down and researched on cryptography. From there I concentrated on writing about Pretty Good Privacy (PGP) which is a cryptography program. The research helped me to understand this various topics and the importance of it.


2. Journal Entries

August 4th 2004

Received assignment 1

Topic: N/A

Source: N/A

  • Received assignment 1. Mr. Kulwant (Lecturer) briefs us on what has to be done and provides guidelines regarding the topics.

August 5th 2004

Book Search

Topic: Client/Server

Source: Book

  • Look through the Client/Server Survival Guide, 3rd Edition by Robert Orfail, Dan Harkey, Jeri Edwards to find a topic of interest for the assignment.  Security seems to be an interesting topic to write about.

August 7th 2004

Discussion

Topic: Topic for assignment

Source: N/A

  • Had a discussion with my course mates concerning the assignments. We exchange ideas and views regarding topics for the assignment. A friend mentions that security is an interesting topic. He advices me to scope down the topic and write something on the subject of cryptography.

August 8th 2004

Magazine Search

Topic: Cryptography/Security

Source: Magazine

  • Started looking through the books and IT magazines for articles relevant to the topic. Couldn’t find relevant articles in the magazines.

August 9th 2004

Internet Search

Topic: Cryptography

Source: Web-site

  • Visited Astalavista at  to look on information on the subject of cryptography.  The web site is a worldwide underground intelligence that deals with security.  I had this site bookmark earlier while working on another research.

Searched for Cryptography using the web-site search engine. Selected astalavista.box.sk for the search server.

  • The search engine brought me to +.  Found a link on the website concerning cryptography,

+.

  • Followed a link on the website, Cryptography papers,
  • Visited this link, an online article, Overview of Cryptography at

  • Bookmarked all the visited links for referencing purposes. Copied the online article into my computer.

August 11th 2004

Internet Search

Topic: Cryptography

Source: Web-site

  • Used Google search engine,  to search for additional information on cryptography. Found this link

August 12th 2004

Internet, Book Search

Topic: Cryptography, encryption

Source: Web-site (offline content), Book

  • Read article on the subject of cryptography

Gary C. Kessler (May 1998)

An Overview of Cryptography [WWW document]. URL

  • Read through Business Data Communications, 4th Edition by William Stallings, pg 578-589 on encryption methods.
  • From the readings I was able to understand some basis of cryptography and encryption. The understanding of these words helped me to understand cryptography better.

Plaintext/Clear Text: Data that is unencrypted, which can be easily understood.

Encryption: The process of manipulating the plaintext into cipher text.

Ciphertext: Unreadable data (makes no sense) that is the result of encrypted plaintext.

        Decryption: The process of converting ciphertext into readable data (plain text).

        Cryptography: The mathematical science use for encryption

        Cryptanalysis: A mathematical way to crack encrypted data

Cipher: A mathematical function or algorithm used to convert plaintext to chipper text.

Cryptosystem: A cipher with its tools and algorithms.

Cryptography is the method to encrypt/decrypt data so it can be safely transmitted across a network. This is important for data and telecommunications when communicating over un-trusted networks.

There are 3 main types of cryptographic schemes, conventional (symmetric) cryptography, public key (asymmetric) cryptography and hash functions.

Conventional (symmetric) cryptography: A form of cryptosystem method where a single key is used for encryption and decryption. The sender uses the key to encrypt the plaintext into ciphertext. The cipher text is sent to the receiver. Upon receiving it, the receiver uses the key to decrypt the ciphertext into plaintext.

Join now!

Public Key (asymmetric) cryptography: A form of cryptosystem where two keys are used for encryption and decryption. One key is called a public key and the other one a private key. The public key is used to encrypt the plaintext and is published worldwide. The personal of this key is kept a secret.  A sender would use the public key to send encrypted information to the user. The user (receiver) holds the private key (no one else has this key) and uses it to decrypt the ciphertext.

Hash Functions: Hash function is an algorithm that doesn’t use a key. A ...

This is a preview of the whole essay