Wednesday, February 28, 2007

The Basics of Cryptography

When Julius Caesar sent messages to his generals, he didn't trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone who knew the “shift by 3” rule could decipher his messages.
And so we begin.

About Encryption and decryption

Data that can be read and understood without any special measures is called plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance is called encryption. Encrypting plaintext results in unreadable gibberish called ciphertext. You use encryption to make sure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting ciphertext to its original plaintext is called decryption. just look this ilustrastion :

Plaintext --> encryption --> chipertext --> descryption --> plaintext


What is cryptography?

Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination, and luck. Cryptanalysts are also called attackers. Cryptology embraces both cryptography and cryptanalysis.

A related discipline is steganography, which is the science of hiding messages rather than making them unreadable. Steganography is not cryptography; it is a form of coding. It relies on the secrecy of the mechanism used to hide the message. If, for example, you encode a secret message by putting each letter as the first letter of the first word of every sentence, it’s secret until someone knows to look for it, and then it provides no security at all.


Strong cryptography


“There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.”

—Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C

PGP is also about the latter sort of cryptography.

Cryptography can be strong or weak, as explained above. Cryptographic strength is measured in the time and resources it would require to recover the plaintext. The result of strong cryptography is ciphertext that is very difficult to decipher without possession of the appropriate decoding tool. How difficult? Given all of today’s computing power and available time—even a billion computers doing a billion checks a second—it is not possible to decipher the result of strong cryptography before the end of the universe.

One would think, then, that strong cryptography would hold up rather well against even an extremely determined cryptanalyst. Who’s really to say? No one has proven that the strongest encryption obtainable today will hold up under tomorrow’s computing power. However, the strong cryptography employed by PGP is the best available today. Vigilance and conservatism will protect you better, however, than claims of impenetrability.


How does cryptography work?

A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. A cryptographic algorithm works in combination with a key—a word, number, or phrase—to encrypt the plaintext. The same plaintext encrypts to different ciphertext with different keys. The security of encrypted data is entirely dependent on two things: the strength of the cryptographic algorithm and the secrecy of the key.

A cryptographic algorithm, plus all possible keys and all the protocols that make it work, comprise a cryptosystem. PGP is a cryptosystem.


Conventional cryptography

In conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for encryption and decryption. The Data Encryption Standard (DES) in an example of a conventional cryptosystem that has been widely deployed by the U.S. Government and the banking industry. It is being replaced by the Advanced Encryption Standard (AES). The following figure is an illustration of the conventional encryption process.

Plaintext --> encryption --> chipertext --> descryption --> plaintext
| -------------------------------- KEY ------------------------------|


Caesar’s cipher

An extremely simple example of conventional cryptography is a substitution cipher. A substitution cipher substitutes one piece of information for another. This is most frequently done by offsetting letters of the alphabet. Two examples are Captain Midnight’s Secret Decoder Ring, which you may have owned when you were a kid, and Julius Caesar’s cipher. In both cases, the algorithm is to offset the alphabet and the key is the number of characters to offset it.

For example, if we encode the word “SECRET” using Caesar’s key value of 3, we offset the alphabet so that the 3rd letter down (D) begins the alphabet.

So starting with
ABCDEFGHIJKLMNOPQRSTUVWXYZ
and sliding everything up by 3, you get
DEFGHIJKLMNOPQRSTUVWXYZABC
where D=A, E=B, F=C, and so on.

Using this scheme, the plaintext, “SECRET” encrypts as “VHFUHW.” To allow someone else to read the ciphertext, you tell them that the key is 3. Obviously, this is exceedingly weak cryptography by today’s standards, but hey, it worked for Caesar, and it illustrates how conventional cryptography works.

Key management and conventional encryption

Conventional encryption has benefits. It is very fast. It is especially useful for encrypting data that is not going anywhere. However, conventional encryption alone as a means for transmitting secure data can be quite expensive simply due to the difficulty of secure key distribution.

Recall a character from your favorite spy movie: the person with a locked briefcase handcuffed to his or her wrist. What is in the briefcase, anyway? It’s probably not the secret plan itself. It’s the key that will decrypt the secret data. For a sender and recipient to communicate securely using conventional encryption, they must agree upon a key and keep it secret between themselves. If they are in different physical locations, they must trust a courier, the Bat Phone, or some other secure communications medium to prevent the disclosure of the secret key during transmission. Anyone who overhears or intercepts the key in transit can later read, modify, and forge all information encrypted or authenticated with that key. From DES to Captain

Midnight’s Secret Decoder Ring, the persistent problem with conventional encryption is key distribution: how do you get the key to the recipient without someone intercepting it?
Public-key cryptography The problems of key distribution are solved by public-key cryptography, the concept of which was introduced by Whitfield Diffie and Martin Hellman in 1975. (There is now evidence that the British Secret Service invented it a few years before Diffie and Hellman, but kept it a military secret—and did nothing with it.(1)

Public-key cryptography uses a pair of keys: a public key, which encrypts data, and a corresponding private key, for decryption. Because it uses two keys, it is sometimes called asymmetric cryptography. You publish your public key to the world while keeping your private key secret. Anyone with a copy of your public key can then encrypt information that only you can read, even people you have never met.

Source : PGP Readme, IntroToCrypto
----------------
1) J H Ellis, The Possibility of Secure Non-Secret Digital Encryption, CESG Report, January 1970. [CESG is the UK’s National Authority for the official use of cryptography.]

Dreams and nightmare of robotics

Imagine a world in which humans are part robot and robots are part human, where biology and machine have collided to create a nation of cyborgs and machine intelligence has become dominant. It's a fantasy, far enough away to seem unlikely to happen in our lifetime yet close enough to draw the taste of dreams and nightmare.
The dream of robotics is first that intelligent machines can do our work for us, allowing us lives of leisure, restoring us to Eden. The second dream of robotics is that we will gradually replace ourselves with our robotic technology, achieving near immortality.

Ray Kurzweil, a computer scientist, share the vision that the rate of improvement of technology was going to accelerate and that we were going to become near immortality by becoming one with robotic technology.

Hans Moravec, a computer scientist and roboticists, stated in his articles “The age of robots”, that growing computer power over the next half-century will produce robots that learn like mammals, model their world like primates and eventually reason like humans. Humanity then will have produced a worthy successor. Even if they wipe out humanity, they represent a higher form of evolution that we should be proud to usher in.

Kevin Warwick, who has spent his career working on robotics, creating machine intelligence at the department of cybernetics at the University of Reading in England, has implanted an electronics-filled glass capsule under the skin of his arm in order to remotely control his computer. Warwick is now developing an even more complex implant project -- he is planning to hard-wire his brain directly to his computer. He warned that our ability to be cyborgs, he warns, might save the human race if the worst possible scenario -- the "Matrix" future -- comes true.

Prof. Dr. Hugo de Garis, who hopes to be known as the Father of the Artificial Brain, believe that 21st century technologies will allow the creation of "artilects" (artificial intellects, artificial intelligences, massively intelligent machines), with intellectual capacities many times greater than those of human beings.

The fear of robotics is that our own creations will eventually become a curse to humanity threatening our existence. Because of their superior nature, we will never be able to revolt again and become sub-class creature. Science fiction, starting from Rossum and Frankenstein, has long been at work on scenarios of robots that evolve and manufacture ever-improving versions of themselves, and eventually develop human traits - the capacity to feel, to love, to hate and eventually wiped out their creator.

Bill Joy, chief scientist at Sun Microsystems, warned that our most powerful 21st-century technologies - robotics, genetic engineering, and nanotech - are threatening to make humans an endangered species. In a recent Wired magazine article “why the future doesn’t need us”, Bill Joy argued that if the machines are permitted to make all their own decisions, as it is impossible to guess how such machines might behave, the fate of human race will be at the mercy of the machines.

source : http:/robonyp.8m.com

HISTORY OF ROBOTICS (PART 4)

Key events in the history of robots (2-end)



1926

-The word robot is used in the movie Metropolis

1938

-Programmable paint-spraying machine

1939

-ABC model computer (Atanasoff‑Berry computer), first


electronic computer

1939-1944

-Harvard/IBM Mark I electromechanical calculator

1940

-First use of the word robotics

1945

-ENIAC, first useful electronic computer

1946

-Patent for general-purpose playback device for


controlling machines (using magnetic process recorder)

1946

-Paper on stored-program computer

1951

-UNIVAC 1, first mass-produced commercial computer

1951

-Teleoperator-equipped articulated arm

1953

-Assembly of watches by miniature robots

1956

-First programmable robot designed for what will become


Unimation. U.S. patent issued in 1961.

1958

-Started the company that would become Unimation and


named the first robot "Unimate"

1959

-Marketing of first commercially available robot

1960

-Purchase of Unimation and development of Unimate


Robot System

1960

-Marketing of Versatran robot

1961

-First Unimate robot installed to tend a die casting machine

1964

-Artificial intelligence research laboratories opened at


MIT, Stanford, and University of Edinburgh

1968

-Shakey robot with vision capability developed at


Stanford Research Institute (SRI)

1968

-Minicomputer

1968

-Unimation takes its first multirobot order from General Motors

1970

- Stanford University -Stanford arm

1971

-The 4004, the first microprocessor

1973

-First commercially available minicomputer controlled­


industrial robot

1974

-Company formed to market an industrial version of the


Stanford arm (minicomputer controlled)

1975

-Cray I array-processor computer

1976

-Robot arms on Viking I and 2 space probes

1976

-Vicarm design now includes a microcomputer

1976

-TRS-80 home microcomputer

1976

-The robotic spacecraft Viking lands on the Martian sur­face

1977

-Two microcomputer-controlled robots

1977

-Purchase of Vicarm

1978

-The PUMA (programmable universal machine for assembly) robot

1980

-Rapid growth of robotics industry, with a new robot or


company added each month

1984

-The "Father of Robotics," starts new company called


Transition Research Corp. concentrating on service robots

1987

-Hooter designed and built, becomes first college rally


squad robot mascot

1988

-SCAMP designed as first robot pet with personality and feelings

1991

-First HelpMate robot becomes operational

1995

-Changes its name to HelpMate Robotics, Inc

1997

-Pathfinder spacecraft lands on Mars with Sojourner


rover robot to explore Mars


Source : http://robonyp.8m.com

HISTORY OF ROBOTICS (PART 3)

Key events in the history of robots (1)

Early history : India's legend of mechanical elephants
Witches and magicians causing inanimate objects to become alive
1000 B.C : Abacus (bead-adding machine)
800 B.C. : Homer -Walking tripods in the Iliad
300 B.C. :Water-powered scale models of creatures that move (automatons)
100 B.C. : Greek ship with analog navigational computer on board
A.D. 1621 : William Oughtred -Rectilinear and circular slide rules
1623 : Wilhelm Schickard -Four-function calculator
1642 : Blaise Pascal -Calculator for adding and subtracting (mass produced)
1730-1780 : Clockwork automatons
1801 : Joseph jacquard -Automated loom using holes punched in cards for control (first NC machine)
1812 : Charles Babbage -Theory of automated computing
1822 : Difference engine
1830 : Christopher Spencer -Cam-operated lathe
1833 : Analytical engine
1868 : Zadoc P. Dederick -Steam-powered rickshaw man
1880s : Railroads -Automaton railroad signal that looks like a man and operates on electricity
1890 : Herman Hollerith -Punch card tabulating equipment for U.S. census
1892 : Seward Babbitt -Motorized crane with gripper to remove ingots from a furnac e
1898 : Nikola Tesla -Radio-controlled submersible boat

Source : http://robonyp.8m.com

HISTORY OF ROBOTICS (PART 2)

First use of the word 'robotics'

The word 'robotics' was first used in Runaround, a short story published in 1942, by Isaac Asimov (born Jan. 2, 1920, died Apr. 6, 1992). I, Robot, a collection of several of these stories, was published in 1950.

One of the first robots Asimov wrote about was a robotherapist. A modern counterpart to Asimov's fictional character is Eliza. Eliza was born in 1966 by a Massachusetts Institute of Technology Professor Joseph Weizenbaum who wrote Eliza -- a computer program for the study of natural language communication between man and machine.

She was initially programmed with 240 lines of code to simulate a psychotherapist by answering questions with questions.


Three Laws of Robotics

Asimov also proposed his three "Laws of Robotics", and he later added a 'zeroth law'.

Law Zero: A robot may not injure humanity, or, through inaction, allow humanity to come to harm.

Law One: A robot may not injure a human being, or, through inaction, allow a human being to come to harm, unless this would violate a higher order law.

Law Two: A robot must obey orders given it by human beings, except where such orders would conflict with a higher order law.

Law Three: A robot must protect its own existence as long as such protection does not conflict with a higher order law.


The First Robot: 'Unimate'

After the technology explosion during World War II, in 1956, a historic meeting occurs between George C. Devol, a successful inventor and entrepreneur, and engineer Joseph F. Engelberger, over cocktails the two discuss the writings of Isaac Asimov.

Together they made a serious and commercially successful effort to develop a real, working robot. They persuaded Norman Schafler of Condec Corporation in Danbury that they had the basis of a commercial success.

Engelberger started a manufacturing company 'Unimation' which stood for universal automation and so the first commercial company to make robots was formed. Devol wrote the necessary patents. Their first robot nicknamed the 'Unimate'. As a result, Engelberger has been called the 'father of robotics.'

The first Unimate was installed at a General Motors plant to work with heated die-casting machines. In fact most Unimates were sold to extract die castings from die casting machines and to perform spot welding on auto bodies, both tasks being particularly hateful jobs for people.

Both applications were commercially successful, i.e., the robots worked reliably and saved money by replacing people. An industry was spawned and a variety of other tasks were also performed by robots, such as loading and unloading machine tools.

Ultimately Westinghouse acquired Unimation and the entrepreneurs' dream of wealth was achieved. Unimation is still in production today, with robots for sale.

The robot idea was hyped to the skies and became high fashion in the Boardroom. Presidents of large corporations bought them, for about $100,000 each, just to put into laboratories to "see what they could do;" in fact these sales constituted a large part of the robot market. Some companies even reduced their ROI (Return On Investment criteria for investment) for robots to encourage their use.

Source : http://www.robotics.utexas.edu/rrg/learn_more/history/

HISTORY OF ROBOTICS (PART 1)

Definition of a 'Robot'

According to the Robot Institute of America (1979) a robot is:
"A reprogrammable, multifunctional manipulator designed to move material, parts, tools, or specialized devices through various programmed motions for the performance of a variety of tasks".

A more inspiring definition can be found in Webster. According to Webster a robot is:
"An automatic device that performs functions normally ascribed to humans or a machine in the form of a human."


First use of the word 'robot'

The acclaimed Czech playwright Karel Capek (1890-1938) made the first use of the word ‘robot’, from the Czech word for forced labor or serf. Capek was reportedly several times a candidate for the Nobel prize for his works and very influential and prolific as a writer and playwright.

The use of the word Robot was introduced into his play R.U.R. (Rossum's Universal Robots) which opened in Prague in January 1921.

In R.U.R., Capek poses a paradise, where the machines initially bring so many benefits but in the end bring an equal amount of blight in the form of unemployment and social unrest.

The play was an enormous success and productions soon opened throughout Europe and the U.S. R.U.R's theme, in part, was the dehumanization of man in a technological civilization.

You may find it surprising that the robots were not mechanical in nature but were created through chemical means. In fact, in an essay written in 1935, Capek strongly fought that this idea was at all possible and, writing in the third person, said:

"It is with horror, frankly, that he rejects all responsibility for the idea that metal contraptions could ever replace human beings, and that by means of wires they could awaken something like life, love, or rebellion. He would deem this dark prospect to be either an overestimation of machines, or a grave offence against life."
[The Author of Robots Defends Himself - Karl Capek, Lidove noviny, June 9, 1935, translation: Bean Comrada]

There is some evidence that the word robot was actually coined by Karl's brother Josef, a writer in his own right. In a short letter, Capek writes that he asked Josef what he should call the artificial workers in his new play.

Karel suggests Labori, which he thinks too 'bookish' and his brother mutters "then call them Robots" and turns back to his work, and so from a curt response we have the word robot.

Source : http://www.robotics.utexas.edu/rrg/learn_more/history/

Tuesday, February 27, 2007

My Opening Manifesto




Hallo friend, this is another side of my soul.
i' m now ready to take some action to make a colourfull world.
In this blog, i want talk about any mistake in my life to share with you, so every body never do the same. or lets try this at home ?

Yeah..., this blog is a documentation of my journey. I like hi-tech, so i found everything about that in web and i post in this blog. I hope this blog can make your journey more easy that my journey.

So, If you don't agree your article post in this blog, you can send your rejection and i will delete that article from my blog. and i'am sorry.