3 5-Keamanan Komputer

download 3 5-Keamanan Komputer

of 28

Transcript of 3 5-Keamanan Komputer

  • 8/18/2019 3 5-Keamanan Komputer

    1/28

    KEAMANAN

    KOMPUTERADITYO NUGROHO,ST TEKNIK PERANGKAT LUNAK UNIVERSITASPGRI RONGGOLAWE TUBAN

    PERTEMUAN 5 – ALGORITMA kriptogr!"o#$r%

  • 8/18/2019 3 5-Keamanan Komputer

    2/28

    A&gorit" 'ip($r )%g *$r*+i+BIT *i&%g% *i%$r-

    S$". #t *ik it. k.%'i,p&i%t$k+, ".p.% 'ip($rt$k+#i%)tk% #&" r%gki%+tri%g- *i%$r

    Ap it. A&gorit"

    Kriptogr! Mo#$r%/

  • 8/18/2019 3 5-Keamanan Komputer

    3/28

  • 8/18/2019 3 5-Keamanan Komputer

    4/28

    U"."%) #t #ipro+$+ #&" *$%t.k*&ok0*&ok *it )%g #it.&i+k% #&"+$1."&( 'r t$rg%t.%g p# p%1%g

    *&ok2

    Mi+& P 3 4 4 4 4 4 4 4 #i*gi

    "$%1#i *it )%g p%1%g%) 6 *it"$%1#i 3

    44 444 44 &i+ 7 48 9

    R%gki% BIT #%

    Op$r+i%)

  • 8/18/2019 3 5-Keamanan Komputer

    5/28

    Bi& p%1%g r%gki% *it ti#k(*i+ #i*gi #$%g% .k.r% *&ok

    )%g #it$tpk%, "k *&ok t$rk(ir#it"*(k% #$%g% *it0*it +$".)%g #i+$*.t PADDING BIT2

    Mi+& 3 4 4 4 4 4 4 4 #i*gi#$%g% *&ok 5 *it "$%1#i 3 444444 0004

    R%gki% BIT #%

    Op$r+i%)

  • 8/18/2019 3 5-Keamanan Komputer

    6/28

    :r &i% .%t.k "$%)tk% r%gki% *it#&( #$%g% %ot+i ($k+#$+i"& HE;-2R%gki% #i*gi "$%1#i *&ok )%g *$r.k.r% 6

    *it 3 < 4 < 4 4 < = 44 < 8

    4 < 6 44 < 5 44 < 9 444 < >

    4 < ? 44 < 7 44 < A 444 < B

    44 < :444 < D444 < E 4444 < @

    R%gki% BIT #%

    Op$r+i%)

  • 8/18/2019 3 5-Keamanan Komputer

    7/28

    Mi+& P 3 4444444 #i*gi"$%1#i 44 444 44, #&"

    %ot+i HE; "$%1#i 7 D 9

    R%gki% BIT #%

    Op$r+i%)

  • 8/18/2019 3 5-Keamanan Komputer

    8/28

    Op$rtor *i%$r )%g +$ri%g #ig.%k%#&" 'ip($r )%g *$rop$r+i #&""o#$ *it #&( ;OR t. $'&.+i$0OR2 Not+i "t$"ti+ ;OR #&(

    <

    4 < 44 < 4

    4 4 <

    R%gki% BIT #%

    Op$r+i%)

  • 8/18/2019 3 5-Keamanan Komputer

    9/28

    Mi+&k% , *, ' #&( p$.*(*oo&$%, "k (.k."0(.k."

    )%g t$rkit #$%g% op$rtor;OR 3

    R%gki% BIT #%

    Op$r+i%)

  • 8/18/2019 3 5-Keamanan Komputer

    10/28

     Cik #. r%gki% *it#iop$r+ik% #$%g% ;OR, "k

    op$r+i%) #i&k.k% #$%g%"$%g0;OR0k% +$tip *it )%g*$rkor$+po%#$% #ri k$#.

    r%gki% *it2:o%to( 3

    R%gki% BIT #%

    Op$r+i%)

  • 8/18/2019 3 5-Keamanan Komputer

    11/28

    D$%g% 'r "$%g0;OR0k% P&i%t$k+P- #$%g% K.%'i K- +$(i%gg"$%g(+i&k% :ip($rt$k+ :-

    Kr$% "$%g0;OR0k% %i&i )%g

    +" #. k&i *$rt.r.t0t.r.t"$%g(+i&k% %i&i +$".&, "k#$krip+i "$%gg.%k% p$r+"% 3

    A&gorit" E%krip+i #$%g%

    ;OR S$#$r(%

  • 8/18/2019 3 5-Keamanan Komputer

    12/28

    A&gorit" E%krip+i #$%g%

    ;OR S$#$r(%

  • 8/18/2019 3 5-Keamanan Komputer

    13/28

    A&gorit" K.%'i Si"$tri  P$%giri" #%

    p$%$ri" "$"i&iki k.%'i )%g +"2B$rop$r+i #&" "o#$ *it2

    42:ip($r A&ir% Str$" :ip($r-

    B$rop$r+i p# p&i%t$k+'ip($rt$k+

    #&" *$%t.k BIT TUNGGAL2 R%gki%*it #i$%krip+i #i#$krip+i *it p$r *it2

    Kt$gori :ip($r K.%'i

    Si"$tri

  • 8/18/2019 3 5-Keamanan Komputer

    14/28

    =2 :ip($r B&ok B&o'k :ip($r-

    B$rop$r+i p# p&i%t$k+'ip($rt$k+

    #&" *$%t.k BLOK BIT2 R%gki%*it #i*gi "$%1#i *&ok0*&ok #%g.k.r% t$rt$%t.2 #i$%krip+i #i#$krip+i *&ok p$r *&ok2

    Kt$gori :ip($r K.%'i

    Si"$tri

  • 8/18/2019 3 5-Keamanan Komputer

    15/28

    P# 'ip($r &ir%, *it (%) "$"p.%)i#. *.( %i&i, +$(i%gg pro+$+ $%krip+i(%) "$%)$**k% #. k$#% p#

    *it 3 *$r.*( t. ti#k *$r.*(2

    D. k$#% t$r+$*.t #it$%t.k% o&$(

    ALIRAN0KUN:I k$)+tr$"- )%g#i*%gkitk% o&$( PEMBANGKIT ALIRANKUN:I k$)+tr$" g$%$rtor-2

    :ip($r A&ir% Str$"

    :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    16/28

    K$"%% +i+t$" i%i +$p$%.(%)

    *$rg%t.%g p# k$)+tr$" g$%$rtor2 Cik )%g #i*%gkitk% (%) *it ,"k'ip($rt$k+ < p&i%t$k+  Ti#k *$rg.%

    :ip($r A&ir% Str$"

    :ip($r-KeystreamGenerator

    KeystreamGenerator

    pi

    ki

    ci pi

    ki

    PlainteksEnkripsi

    Keystream Keystream

    Cipherteks PlainteksDekripsi

  • 8/18/2019 3 5-Keamanan Komputer

    17/28

     Cik k$)+tr$" g$%$rtor"$%g$&.rk% &ir% k.%'i

    #$%g% po& 490*it )%g*$r.&%g, "k &gorit"$%krip+i%) "$%1#i +" p$r+i+

    #$%g% ;OR +$#$r(% #$%g%ti%gkt k$"%% )%g r$%#(2

    :ip($r A&ir% Str$"

    :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    18/28

     Cik k$)+tr$" g$%$rtor "$%g$&.rk%&ir% k.%'i )%g *$%r0*$%r 'ktr.&) r%#o"-, "k &gorit"$%krip+i%) +" #$%g% o%$0ti"$ p##$%g% ti%gkt k$"%% )%g+$"p.r%2 D&" (& i%i &ir% k.%'i

    +" p%1%g%) #$%g% p%1%gp&i%t$k+ +$(i%gg k% #i#ptk%.%*r$k*&$ 'ip($r2

    :ip($r A&ir% Str$"

    :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    19/28

    K$+i"p.&% 3 (%) #$%g%p$r(it.%g% ;OR +$#$r(%,

    KUN:I A:AK )%g #i0g$%$rt$SEPANCANG p&i%t$k+ #% "$to#$$%krip+i ONE0TIME PAD, k%

    #i#ptk% 'ip($rt$k+ )%g +.&it#ip$'(k%2

    :ip($r A&ir% Str$"

    :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    20/28

    R%gki% *it0*it p&i%t$k+ #i*gi"$%1#i *&ok0*&ok *it #$%g% p%1%g

    +", *i+%) 960*it t. &$*i(2

    K$".#i% +$tip *&ok #i0$%krip+i

    #$%g% *it0*it k.%'i )%g p%1%g%)+" #$%g% p%1%g *it #&" *&okp&i%t$k+2

    :ip($r B&ok B&o'k :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    21/28

    A&gorit" 'ip($r *&ok "$%gg*.%gk%*$*$rp t$k%ik kriptogr! k&+ik #&"pro+$+ $%krip+i +$(i%gg #pt "$%1#i

    +.p$r0$%krip+i2

    1.Substitusi

    M$%gg%tik% +t. t. +$k."p.&%*it p# *&ok p&i%t$k+ t%p "$r.*(.r.t%%)2

    :ip($r B&ok B&o'k :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    22/28

    2.  Transposisi atau permutasi

    M$"i%#(k% t. "$%gg$+$r

    po+i+i *it p# *&ok p&i%t$k+*$r#+rk% t.r% t$rt$%t.2

    3.   Ekspansi

    M$"p$r*%)k 1."&( *it p# *&okp&i%t$k+ *$r#+rk% t.r%t$rt$%t.2 Mi+& 8=0*it "$%1#i 6?0*it2

    :ip($r B&ok B&o'k :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    23/28

    4.   Kompresi

    K$*&ik% #ri $k+p%+i,

     1."&( *it p# *&ok p&i%t$k+#i""ptk% *$r#+rk%t.r% t$rt$%t.2

    :ip($r B&ok B&o'k :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    24/28

     T(.% 4767, S(%%o% "$%g$".kk%#. pri%+ip prop$rti$+- p$%)%#i%$%'o#i%g- #t #&" "k&(%))%g *$r1.#.& :o"".%i'tio% T($or) oS$'r$') S)+t$"+2

    K$#. pri%+ip t$r+$*.t #ig.%k% #&"p$r%'%g% 'ip($r *&ok )%g k.t2

    :ip($r B&ok B&o'k :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    25/28

    1.  Confusion

    M$%)$"*.%)ik% (.*.%g% pp.%%tr p&i%t$k+, 'ip($rt$k+ #%k.%'i2 H& i%i k% "$"*.tkript%&i+ r.+t+i .%t.k "$%'ripo&0po& )%g ".%'.& p#

    'ip($rt$k+2 :o%.+io% k% "$"*.t(.*.%g% +tti+tik p&i%t$k+,'ip($rt$k+ #% k.%'i "$%1#i r."it2

    :ip($r B&ok B&o'k :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    26/28

    2.   Diusion

    M$%)$*rk% p$%gr.( +t.

    *it p&i%t$k+ t. k.%'i k$+$*%)k ".%gki% 'ip($rt$k++$(i%gg p$r.*(% p#

    'ip($rt$k+ ti#k #pt#ipr$#ik+i2

    :ip($r B&ok B&o'k :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    27/28

    U%t.k "$%#ptk% k$"%%)%g ti%ggi, pri%+ip 'o%.+io% #%

    #iF.+io% #i.&%g *$rk&i0k&i p#tip0tip *&ok $%krip+i #$%g%ko"*i%+i )%g *$r*$#2

    :ip($r B&ok B&o'k :ip($r-

  • 8/18/2019 3 5-Keamanan Komputer

    28/28

    Dit.&i+ t%g% p# k$rt+ o&io*$rgri+ .t.( ti#k #i+o*$k- 3

     C$&+k% "$%g$%i A&gorit"E%krip+i

     R:6

     A5

     T.g+