18
2.13 Encryption and Decryption Algorithm
According
to
Mitchell
Bradley[26]
Encryption
is
a
process
of
coding
in
sequence
which
could
either
be
a
file
or
mail
message
in
into
cipher
text a
form
unreadable
without a decoding key in order to avoid anyone except the intended recipient from
reading
that
data.
Decryption
is
the
reverse
process
of
convert encoded
data
to
its
original un-encoded form, plaintext. A key in cryptography is a long sequence of bits
used
by
encryption
/
decryption
algorithms.
For
example,
the
following
represents a
hypothetical 40-bit key: 00001010 01101001 10011110 00011100 01010101A given
encryption algorithm take the original message, and a key, and alters the original
message
mathematically
base
on
the
key's bits
to
make
a
new
encrypted
message.
Likewise, decryption algorithms take an encrypted message and restore it to its original
form using one or more keys.
2.14 Session Hijacking
Session
hijacking refers
to the exploitation of a
valid computer sessionsometimes also
called
a
session
keyto
gain
unauthorized
access
to
information
or
services
in a
computer system.
In particular,
it
is
used to
refer to the theft of a
magic cookie
used
to
authenticate a
user to a
remote server. It
has particular relevance
to
web developers,
as
the HTTP cookies
used to
maintain a session on
many web sites can be easily stolen by
|