Authentication Cryptography LITERATURE REVIEW

29 example would be step number=3Connect A to B.step where the name of the attribute is number and the value is 3. SOAP , originally defined as Simple Object Access Protocol, is a protocol specification for exchanging structured information in the implementation of Web Services in computer networks. It relies on Extensible Markup Language XML for its message format, and usually relies on other Application Layer protocols, most notably Remote Procedure Call RPC and Hypertext Transfer Protocol HTTP, for message negotiation and transmission. SOAP can form the foundation layer of a web services protocol stack, providing a basic messaging framework upon which web services can be built. This XML based protocol consists of three parts: an envelope, which defines what is in the message and how to process it, a set of encoding rules for expressing instances of application- defined data types, and a convention for representing procedure calls and responses [6].

2.4 Authentication

Authentication derived from the Greek, authentes = author, namely an action to set something or someone is genuine. Proving originality an object is to establish the place of origin, while to prove the authenticity of a person is with their identity [4]. Authentication in humans depends on several factors:

A. Something the user is

An example is DNA, retina patterns, fingerprints, voice patterns, biometrics, bio-electric signals produced by the body. 30

B. Something the user has

An example is the ID card, security token, software token and cell phone.

C. Something the user know

Examples include passwords, PINs etc. The first problem, prove the authenticity of documents, can be done with watermarking and digital signature technology. Watermarking can also be used to protect intellectual property, namely by marking the documents or the work of the makers signature. The second problem is access control. A computer system is expected to can be used only by that given the right, so that the computer system should be able to detect and reject a user who does not have rights. Sample access control which Authentication include : ² Using the internet banking system ² controlling the remote computer with internet

2.5 Cryptography

Cryptography derived from the Greek word which consists of Kryptos, which means graft hidden and meaningful writing. Cryptography in general is the science and art to maintain the confidentiality of news. In addition to these terms as well cryptography is a science that studies mathematical techniques 31 related with aspects of information security such as data confidentiality, validity of data, integrity bag data, and authentication data. [4] There are four fundamental goals of science cryptography which is the security aspect:

A. Confidentiality

It is a service used to keep the contents of the information from anyone except the one with the authority or the secret key to unlock or peel the information that has been encoded.

B. Data Integrity

Associated with the maintenance of the data changes illegally, for maintaining data integrity, the system must have the ability to detect manipulation of data by parties who are not eligible, including insertion, removal, and other data into the data. [4]

C. Authentication

Associated with the recognition, either in whole system as well as the information itself, the two parties must communicate with each other introduced themselves. Information sent through the canal should authenticated authenticity, data content, delivery time, and others.

D. Non- Repudiation

Efforts to prevent the denial of the transfer or creation of an information by which to send or make 32 The process of randomization or the process being undertaken to secure a message called plaintext into a hidden message called a cipher text is encrypted encryption. According to ISO 7498-2, terminology opposite process, to convert ciphertext into plaintext, called de descriptions decryption. According to ISO 7498-2, more precise terminology for this process is to decipher.

2.6 Encryption