keamanan jaringan · keamanan jaringan s1 teknik ... uu ite (informasi dan transaksi elektronik) di...
TRANSCRIPT
![Page 1: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/1.jpg)
1
KEAMANAN JARINGAN
S1 Teknik Telekomunikasi
Fakultas Teknik Elektro
Universitas Telkom
1
![Page 2: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/2.jpg)
2
Law & EthicsIn Information Security
![Page 3: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/3.jpg)
3
Law and Ethics in Information Security
Laws
Rules that mandate or prohibit certain behavior
Drawn from ethics
Ethics
Define socially acceptable behaviors
Key difference
Laws carry the authority of a governing body
Ethics do not carry the authority of a governing body
Based on cultural mores
Fixed moral attitudes or customs
Some ethics standards are universal
![Page 4: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/4.jpg)
4
Policy Versus law
• Policies• Guidelines that describe acceptable and unacceptable employee
behaviors
• Functions as organizational laws
• Has penalties, judicial practices, and sanctions
• Difference between policy and law• Ignorance of policy is acceptable
• Ignorance of law is unacceptable
• Keys for a policy to be enforceable• Dissemination
• Review
• Comprehension
• Compliance
• Uniform enforcement
![Page 5: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/5.jpg)
5
UU ITE (Informasi dan Transaksi Elektronik) di Indonesia
![Page 6: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/6.jpg)
6
Terkait Confidentiality & Authentication
![Page 7: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/7.jpg)
7
Terkait Confidentiality
SANKSI PASAL 30 AYAT 1
SANKSI PASAL 30 AYAT 3
![Page 8: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/8.jpg)
8
Terkait Confidentiality & Integrity
![Page 9: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/9.jpg)
9
SANKSI PASAL 31
![Page 10: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/10.jpg)
10
Terkait Integrity
Terkait Availability
![Page 11: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/11.jpg)
11
SANKSI PASAL 32 AYAT 1
SANKSI PASAL 33
![Page 12: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/12.jpg)
12
Terkait Confidentiality & Integrity
![Page 13: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/13.jpg)
13
Terkait Integrity
![Page 14: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/14.jpg)
14
Diluncurkan situs TURNBACKHOAX.ID oleh gerakan Masyarakat Indonesia Anti Hoax dan Aplikasi mobile TURNBACKHOAX oleh Mastel (Masyarakat Telekomunikasi dan Informatika Indonesia).
"Dalam UU ITE, aparat hukum tidak bisa menahan tersangka penghinaan dan atau pencemaran nama baik. Hukuman hanya boleh dilakukan jika sudah ada keputusan pengadilan tetap. UU ITE yg baru juga mengatur Cyber Bulying atau menakut-nakuti dengan informasi elektronik sebagai ekstensi pasal 29 yang lama RUU REVISI UU ITE," jelas Staf Ahli Menteri Kominfo Bidang Komunikasi dan Media Massa Henri Subiakto di Jakarta,
![Page 15: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/15.jpg)
Introduction of Cryptography
References:
1. Applied Cryptography, Bruce Schneier
2. Introduction to Modern Cryptography, Jonathan Katz and Yehuda Lindell
25/01/2017
15
![Page 16: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/16.jpg)
Definitions
• Cryptography was the art of writing or solving codes.
The Concise Oxford Dictionary (2006)
• Cryptography was an art to construct and break good codes.
Until 20th century
• Cryptography was a science.
The late 20th century
• Cryptography encompasses much more than secret communication.
Now
25/01/2017
16
![Page 17: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/17.jpg)
Modern Cryptography
It’s the scientific study of techniques for securing digital
information, transactions, and
distributed computations.
25/01/2017
17
![Page 18: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/18.jpg)
Clasical Cryptography vs Modern Cryptography
• Cryptography was in military and intelligence organizations.
Classical Cryptography
• Cryptography is everywhere!Modern
Cryptography
25/01/2017
18
![Page 19: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/19.jpg)
Terminology
• MessagePlaintext (cleartext)Plaintext (cleartext)
• The process to disguise messageEncryptionEncryption
• Encrypted messageCiphertextCiphertext
• The process to turn back ciphertext into plaintext
DecryptionDecryption
• The algorithm of cryptographyCipherCipher
• A cipher with plaintext, ciphertext, and key.
CryptosystemCryptosystem
25/01/2017
19
![Page 20: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/20.jpg)
Terminology (cont’d)
CryptographyCryptography
• The art and science to make message secure
CryptographersCryptographers
• People who practice cryptography
CryptanalysisCryptanalysis
• The art and science to break ciphertext
CryptanalystsCryptanalysts
• People who practice cryptanalysis
CryptologyCryptology
• The branch of mathematics involving cryptography and cryptanalysis
CryptologistsCryptologists
• People who practice cryptology
25/01/2017
20
![Page 21: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/21.jpg)
Kerckhoffs’ Principle
• The cipher method must not be required to be secret, and it must beable to fall into the hands of the enemy without inconvenience.
Why?
• It is more easy to keep the secrecy of key than cipher.
• It is more easy to change the key than cipher.
21
![Page 22: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/22.jpg)
Cryptography vs Steganography
Cryptography
The art and science to make message secure
It doesn’t need other message
Steganography
The art and science to hide
message in other message
It needs other message
25/01/2017 22
![Page 23: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/23.jpg)
Encryption – Decryption Process
Plaintext Encryption Ciphertext Decryption Original plaintext
E(M) = C
D(C) = M
D(E(M)) = M
M : message/plaintext
C : ciphertext
E : encription process
D : decription process
25/01/2017 23
![Page 24: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/24.jpg)
Cyptography’s jobs
Authentication
• The receiver ascertains originality of message.
Integrity
• The receiver verifies message that it hasn’t modified in transit.
Nonrepudiation
• A sender shouldn’t be able to deny that he sent a message.
25/01/2017 24
![Page 25: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/25.jpg)
Cryptograpic Algorithm
• A cyptographic algorithm (cipher) is the mathematical function forencription and decription.
• A restricted algorithm is the cryptographic algorithm based onkeeping that it works a secret. This algorithm has no quality control orstandardization.
• Key-based algorithms consist of symmetric algorithm and asymmetricalgorithm.
25/01/2017 25
![Page 26: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/26.jpg)
Symmetric Algorithm
• It’s also called conventional algoritm or private-key algorithm.
• The decryption key can be calculated from the encription key andvice versa. The decryption key and ecnryption key are the same.
• Encryption and decryption process can be denoted by:
Ek(M) = C
Dk(C) = M
25/01/2017 26
![Page 27: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/27.jpg)
Symmetric Algorithm (cont’d)
Examples of
symmetric algorithm:
Caesar Cipher
Data Encryption
Standar (DES)
3 Data Encription
Standar (3DES)
25/01/2017 27
![Page 28: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/28.jpg)
Asymmetric Cryptography
• It’s also called public-key algorithm.
• The decryption key can’t be calculated from the encription key andvise versa. The decryption key and encryption key aren’t the same.
• Encryption and decryption process can be denoted by:
Ek1(M) = C
Dk2(C) = M
25/01/2017 28
![Page 29: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/29.jpg)
Asymmetric Cryptography (cont’d)
Examples of
asymmetric algorithm:
Digital Signature
Rivest Shamir
Adleman (RSA)
25/01/2017 29
![Page 30: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/30.jpg)
Protocol of Cryptography
Protocol is a series of steps between two or more parties to do the task.
Characteristics of protocol:
• It has a sequence from start to finish
• It involves two or more parties
• It achieves something
25/01/2017 30
![Page 31: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/31.jpg)
Protocol for Symmetric Cryptography
• Alice and Bob agree on a cryptosystem.
• Alice and Bob agree on a key.
• Alice encrypts plaintext using the encryption algorithm and the key.The result is ciphertext.
• Alice sends ciphertext to Bob.
• Bob decrypts ciphertext using the same algorithm and key and readsit.
25/01/2017 31
![Page 32: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/32.jpg)
Protocol for Asymmetric Cryptography (1)
• Alice and Bob agree on a cyptosystem.
• Bob sends Alice his public key.
• Alice encrypts plaintext using Bob’s public key and sends it to Bob.
• Bob decrypts Alice’s ciphertext using his private key.
25/01/2017 32
• Alice gets Bob’s public key from database. All public keys arepublished on database.
• Alice encrypts plaintext using Bob’s public key and sends it to Bob.
• Bob decrypts Alice’s ciphertext using his private key.
![Page 33: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/33.jpg)
Protocol for Asymmetric Cryptography (2)
• Alice gets Bob’s public key from database. All public keys arepublished on database.
• Alice encrypts plaintext using Bob’s public key and sends it to Bob.
• Bob decrypts Alice’s ciphertext using his private key.
25/01/2017 33
![Page 34: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/34.jpg)
Protocol for Hybrid Cryptography
• Bob sends Alice his public key.
• Alice generates a random session key, encrypts it using public key,and sends it to Bob.
• Bob decrypts ciphertext using private key to recover session key.
• Alice and Bob encrypt their communications using the same sessionkey.
25/01/2017 34
![Page 35: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/35.jpg)
Symmetric Algorithm of
Cryptography
References:
1. Applied Cryptography, Bruce Schneier
2. Cryptography and Network Security Principles and Practice, William Stallings
3. Introduction to Modern Cryptography, Jonathan Katz and Yehuda Lindell
4. Some Problems in Symmetric ans Asymmetric Cryptography, Santosh Kumar Yadav (Prof. Sunder Lal and Prof. S. C. Arora)
![Page 36: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/36.jpg)
Symmetric Algorithm (1)
• It’s familiar to private-key algorithm.
•The key of ecryption and decryption are the same.
•Symmetric algorithm consist of two types:
• Stream cipher
•Block cipher
![Page 37: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/37.jpg)
Stream Chiper
![Page 38: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/38.jpg)
Block Chiper
![Page 39: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/39.jpg)
Symmetric Algorithm (2)
![Page 40: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/40.jpg)
Attacking Encryption system
•Cryptanalysis: This type of attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used
•Brute-force attack: The attacker tries every possible key on a piece of cipher-text until an intelligible translation into plaintext is obtained.
![Page 41: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/41.jpg)
Encryption Goal
•The cost of breaking the cipher exceeds the value of the encrypted information
•The time required to break the cipher exceeds the useful lifetime of the information
![Page 42: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/42.jpg)
![Page 43: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/43.jpg)
Symmetric Algorithm (2)
• Its keys are short.
• Key of ciphers can be designed to have high rate of data.
• Key of ciphers can be composed to produce stronger ciphers.
Advantages
• The key must be shared by sender to receiver.Disadvantages
![Page 44: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/44.jpg)
Symmetric Algorithm (3)
Caesar Cipher
Vigenere Cipher
![Page 45: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/45.jpg)
Caesar Cipher (1)
• It is one of Shift Cipher that has key of 3 (K = 3).
• This cipher is defined over Z26. It means that there are 26 letters in theEnglish Alphabet.
• To encrypt the plaintext, plaintext is shifted using the key.
• Encryption process:
• C = Enck(M) = (M+K) mod 26
• Decryption process:
• M = Deck(C) = (C-K) mod 26
![Page 46: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/46.jpg)
Caesar Cipher (2)
A B C D E F G H I J K L M
0 1 2 3 4 5 6 7 8 9 10 11 12
N O P Q R S T U V W X Y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
![Page 47: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/47.jpg)
Caesar Cipher (3)
• Example:
• Determine the ciphertexts of these plaintexts:
• cryptographyistheart
• therearetwoalgorithms
![Page 48: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/48.jpg)
Vigenere Cipher (1)
• Polyalphabetic ciphers technique.
• Implementing different cesar chipper each alphabet.
• Each alphabet has different shift, generated by key (determined)
• Encryption process:
• Ci = Enck(M i) = (M i +K i) mod 26
• Decryption process:
• M i = Deck(C i) = (C i -K i) mod 26
![Page 49: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/49.jpg)
Vigenere Cipher (2)
• key: deceptivedeceptivedeceptive
• plaintext: wearediscoveredsaveyourself
• ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ
![Page 50: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/50.jpg)
TUGAS !
Pengenalan Teknik Telekomunikasi (HUG1K3) 50
Data Encryption Standard
![Page 51: KEAMANAN JARINGAN · KEAMANAN JARINGAN S1 Teknik ... UU ITE (Informasi dan Transaksi Elektronik) di Indonesia. 6 ... menakut-nakuti dengan informasi elektronik sebagai](https://reader031.vdocuments.site/reader031/viewer/2022021915/5ca40f9488c99390328bd4ce/html5/thumbnails/51.jpg)
5151