Your SlideShare is downloading. ×
ikh323-02
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ikh323-02

705

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
705
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
22
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Kriptografi2011-2012-3 Anung Ariwibowo 1
  • 2.  Kriptografi dan Sistem Keamanan Komputer  Standar Sistem Keamanan  Enkripsi Kunci Simetrik  Number Theory  Enkripsi Kunci Publik  Autentikasi Pesan dan Fungsi Hash2011-2012-3 Anung Ariwibowo 2
  • 3.  Jaminan yang diberikan oleh protokol komunikasi  Lima kategori dan Empat belas layanan  Authentication  Jaminan keaslihan pihak-pihak yang terlibat dalam komunikasi 1. Peer-entity 2. Data-Origin2011-2012-3 Anung Ariwibowo 3
  • 4.  Access Control  Siapa yang boleh mengakses sumber daya Apa pada waktu Kapan dengan cara Bagaimana (Who, What, When, How)  Data Confidentiality 1. Connection confidentiality 2. Connectionless confidentiality 3. Selective-field confidentiality 4. Traffic-flow confidentiality2011-2012-3 Anung Ariwibowo 4
  • 5.  Data Integrity 1. Connection integrity with Recovery 2. Connection integrity without Recovery 3. Selective-field connection Integrity 4. Connectionless integrity 5. Selective-field connectionless integrity  Nonrepudiation 1. Origin nonrepudiation 2. Destination nonrepudiation2011-2012-3 Anung Ariwibowo 5
  • 6.  Implementasi keamanan pada protokol dan lapis-lapis komunikasi  Specific security mechanisms  Encipherment  Digital Signature  Access Control  Data Integrity  Authentication Exchange  Traffic Padding  Routing Control  Notarization2011-2012-3 Anung Ariwibowo 6
  • 7.  Pervasive security mechanisms  Tidak spesifik pada layer atau protokol tertentu  Trusted Functionality  Security Label  Event detection  Security audit trail  Security recovery2011-2012-3 Anung Ariwibowo 7
  • 8.  Berbagai bentuk kegiatan yang membuat informasi sebuah organisasi menjadi terancam  Passive attack  Menggunakan informasi, tidak mengubah sistem  Sulit terdeteksi  Message transmission  Traffic analysis2011-2012-3 Anung Ariwibowo 8
  • 9.  Active attack  Berpotensi mengubah informasi  Masquerade  Replay  Message modification  Denial of Service2011-2012-3 Anung Ariwibowo 11
  • 10.  Active attack  Mudah terdeteksi  Sulit diatasi  Recovery2011-2012-3 Anung Ariwibowo 12
  • 11.  Pengirim  Penerima  Secure-channel  Opponent  Arbiter2011-2012-3 Anung Ariwibowo 13
  • 12.  Information System  Opponent  Access channel  Gatekeeper2011-2012-3 Anung Ariwibowo 15
  • 13.  Stallings, "Cryptography and Network Security"http://williamstallings.com/Cryptography/  Schneier, "Applied Cryptography" http://www.schneier.com/book-applied.html  Thomas L Noack, http://ece.uprm.edu/~noack/crypto/  Slides tjerdastangkas.blogspot.com/search/label/ikh3232011-2012-3 Anung Ariwibowo 17

×