implementasi kriptografi rsa ( rivest shamir adleman )...
TRANSCRIPT
IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST –
SHAMIR – ADLEMAN ) PADA SISTEM APLIKASI FILE
TRANSFER BERBASIS WEB : AUTHENTICATION /
OTENTIKASI
TUGAS AKHIR
Disusun Oleh :
Oktafiandi Mahardika Saputro
201310150511004
JURUSAN ELEKTRO - DIPLOMA III
FAKULTAS TEKNIK
UNIVERSITAS MUHAMMADIYAH MALANG
2016
KATA PENGANTAR
Dengan memanjatkan puji syukur kehadirat Allah SWT. Atas limpahan rahmat
dan hidayah-NYA sehingga peneliti dapat menyelesaikan tugas akhir yang berjudul :
“IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST – SHAMIR – ADLEMAN
) PADA SISTEM APLIKASI FILE TRANSFER BERBASIS WEB :
AUTHENTICATION / OTENTIKASI”
Di dalam tulisan ini disajikan pokok – pokok bahasan yang meliputi :
Perancangan sistem, implementasi sistem dan pengujian sistem.
Peneliti menyadari sepenuhnya bahwa dalam penulisan tugas akhir ini masih
banyak kekurangan dan keterbatasan. Oleh karena itu peneliti mengharapkan saran
yang membangun agar tulisan ini bermanfaat bagi perkembangan ilmu pengetahuan
kedepan.
Malang, 17 Januari 2017
Penulis
DAFTAR ISI
COVER ......................................................................................................................... i
LEMBAR PERSETUJUAN......................................................................................... ii
LEMBAR PENGESAHAN ........................................................................................ iii
LEMBAR PERNYATAAN ........................................................................................ iv
ABSTRAK ................................................................................................................... v
KATA PENGANTAR ............................................................................................... vii
DAFTAR ISI ............................................................................................................. viii
DAFTAR GAMBAR .................................................................................................. xi
DAFTAR TABEL ...................................................................................................... xii
BAB I PENDAHULUAN ............................................................................................ 1
1.1 Latar Belakang ............................................................................................... 1
1.2 Rumusan Masalah .......................................................................................... 2
1.3 Tujuan ............................................................................................................ 2
1.4 Batasan Masalah ............................................................................................ 3
1.5 Metodologi ..................................................................................................... 3
1.6 Sistematika Penulisan .................................................................................... 3
BAB II LANDASAN TEORI ...................................................................................... 5
2.1 Web ............................................................................................................... 5
2.2 Ubuntu ........................................................................................................... 5
2.3 Web Server .................................................................................................... 6
2.3.1 Apache.................................................................................................. 6
2.3.2 Nginx .................................................................................................... 6
2.4 PHP ( Personal Home Page ) ........................................................................ 7
2.5 MySQL ( My Sctructured Query Language ) ............................................... 8
2.6 Pengertian Keamanan.................................................................................... 8
2.7 Pengertian Autentikasi .................................................................................. 9
2.8 Isms API ( Application Programming Interface ) ....................................... 10
2.9 Definisi Kriptografi ..................................................................................... 11
2.9.1. Pengertian ......................................................................................... 11
2.9.1.1 Pengiriman dan Penerimaan ................................................ 11
2.9.1.2 Pesan, Plaintext, dan Chipertext.......................................... 11
2.9.1.3 Enkripsi dan Dekripsi .......................................................... 12
2.9.1.4 Algoritma Kriptografi dan Kunci ........................................ 13
2.9.1.5 Sistem Kriptografi ............................................................... 13
2.9.1.6 Penyadap ............................................................................. 13
2.9.1.8 Tujuan Kriptografi .............................................................. 13
2.9.2 Konsep Matematis Kriptografi ........................................................ 14
2.10 Algoritma RSA ......................................................................................... 15
2.10.1 Tinjauan Umum ............................................................................ 15
2.10.2 Properti Algortima RSA ............................................................... 16
2.10.3 Perumusan Algoritma RSA .......................................................... 16
2.10.4 Algoritma Membangkitkan Pasangan Kunci ............................... 18
2.10.5 Algoritma Enkripsi dan Deskripsi ................................................ 20
2.10.5.1 Enkripsi .......................................................................... 20
2.10.5.2 Deskripsi ....................................................................... 20
BAB III ANALISA DAN PERANCANGAN SISTEM ............................................ 22
3.1 Pendahuluan ................................................................................................ 22
3.1.1 Diagram Konteks (context diagram) .................................................. 23
3.2 Identifikasi Hubungan (connection) antara Sistem dan Pemakai (user) ..... 24
3.2.1 Diagram Use - Case ........................................................................... 25
3.2.2 Dokumentasi Use - Case .................................................................... 25
3.2.3 Diagram Kelas (class diagram) ......................................................... 26
3.2.4 Statechart Flowchart........................................................................... 27
3.3 Perancangan dan Implementasi ................................................................... 29
3.3.1 Perencanaan dan Implementasi Flowchart ......................................... 31
3.4 Register ....................................................................................................... 30
3.5 Hasil Akhir Perencanaan ............................................................................. 31
BAB IV IMPLEMENTASI DAN PENGUJIAN ...................................................... 33
4.1 Implementasi Konfigurasi Pada Proses Keamanan Login .......................... 33
4.1.1 Instalasi Server Web ......................................................................... 33
4.1.2 Instalasi Program ............................................................................... 33
4.1.3 Konfigurasi Program ......................................................................... 35
4.1.3.1 Konfigurasi User Database .................................................... 36
4.1.3.2 Pengujian Proses Generate Key ............................................. 37
4.1.4 Database menggunakan MySQL ....................................................... 49
4.2 Implementasi Penggunaan Web File Transfer ............................................ 50
4.2.1 Tampilan Halaman Utama ................................................................. 51
4.2.2 Tampilan Login .................................................................................. 51
4.2.3 Tampilan Pendaftaran ........................................................................ 52
4.2.4 Tampilan Verifikasi ........................................................................... 52
4.2.4.1 Penerimaan Melalui SMS ...................................................... 53
4.2.4.2 Penerimaan Melalui Email ..................................................... 54
4.2.5 Tampilan Awal Utama ....................................................................... 54
BAB V PENUTUP ................................................................................................... 56
5.1 Kesimpulan ................................................................................................. 56
5.2 Saran ............................................................................................................ 56
DAFTAR PUSTAKA ................................................................................................ 57
LAMPIRAN ............................................................................................................... 58
DAFTAR GAMBAR
Halaman
Gambar 2.1 Proses Enkripsi dan Dekripsi ................................................................. 14
Gambar 2.2 Proses Enkripsi dan Dekripsi dengan Kunci .......................................... 17
Gambar 3.1 Diagram Konteks antara User, Local Server dengan iSMS Server........ 25
Gambar 3.2 Diagram Use – Case antara User, Local Server dan iSMS Server ......... 27
Gambar 3.3 Diagram Use – Case Local Server ......................................................... 29
Gambar 3.4 Kelas (class) yang Membentuk Sistem Keamanan ................................ 28
Gambar 3.5 Flowchart Proses Masuk ke Dalam Halaman Web ................................ 30
Gambar 3.6 Flowchart Pendaftaran............................................................................ 31
Gambar 3.7 Flowchart Login ..................................................................................... 31
Gambar 3.8 Flowchart Verifikasi ............................................................................... 32
Gambar 3.9 Flowchart Penerimaan Kode .................................................................. 32
Gambar 4.1 Tampilan File Dalam Hosting ................................................................ 36
Gambar 4.2 Tampilan Directory Di Dalam Hosting .................................................. 36
Gambar 4.3 Tampilan Database ................................................................................. 51
Gambar 4.4 Tampilan Halaman Utama ..................................................................... 52
Gambar 4.5 Tampilan Login ...................................................................................... 52
Gambar 4.6 Pengujian Pendaftaran ............................................................................ 53
Gambar 4.7 Pengujian Verifikasi ............................................................................... 54
Gambar 4.8 Tampilan Penerimaan Kode Melalui SMS............................................. 55
Gambar 4.9 Tampilan Penerimaan Kode Melalui Email ........................................... 55
Gambar 4.10 Tampilan Menu Utama......................................................................... 55
DAFTAR TABEL
Tabel 3.1 Jenis interaksi antara pengguna dan server ........................................ 26
Tabel 3.2 Use-case description untuk pengguna ( user ) .................................... 28
Tabel 3.3 Use-case description untuk server....................................................... 28
DAFTAR PUSTAKA
[1] Khairina Marisa Dyna 2011. Analisis Keamanan Sistem Login : 6
[2] Riankostans.wordpress – komunikasi data
[3] Munir. 2004
[4] proweb – web design
[5] linux – what is linux
[6] whatis techtarget – definition web server
[7] apache
[8] php – intro whatis php
[9] hastomo – pengertian dan kelebihan database mysql
[10] M. Abrams and P. Brusil. 2000; Computer Security Journal : 2
[11] Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P.,
Luotonen, A., and Stewart, L. 1999. HTTP Authentication: Basic and Digest
Access Authentication.
[12] isms - Pengertian iSMS API