SlideShare a Scribd company logo
1 of 16
Download to read offline
Kriptografi
Kritografi 
•Kritografi “kuno” 
–Subtitusi Cipher 
–Transposisi Cipher 
•Kriptografi Modern
Kriptografi Kuno 
•Subtitution Cipher 
–Monoalphabetic Cipher 
–Polyalphabetic Cipher 
•Transposition Cipher 
–Mirror/Reverse, Rail Fence, Geometric Figure 
–Row Transposition Cipher 
–Block Transposition Cipher 
–ADVGFX Product Cipher
Monoalphabetic Cipher 
•Caesar Chiper 
–L FDPH L VDZ L FRQTXHUHG 
–I CAME I SAW I CONQUERED 
•Mixed Monoalphabetic Cipher 
–A M I K O M 
–D C W E H C 
PlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherDEFGHIJKLMNOPQRSTUVWXYZABCPlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherDKVQFIBJWPESCXHTMYAUOLRGZN
Monoalphabetic Cipher 
•Easier Monoalphabetic Cipher 
–B E R D A S I 
–M O C K A D S 
•Kelemahan : 
–Frekuensi kemunculan huruf tidak dapat dihilangkan 
PlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherAMIKOPQRSTUVWXYZBCDEFGHJLN
Polyalphabetic Cipher 
•Vigenere CiPHER 
TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMTQUZOFKGTSOTCMTYBBEZOEGMHMPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAABCDEFGHIJKLMNOPQRSTUVWXYZMMNOPQRSTUVWXYZABCDEFGHIJKLIIJKLMNOPQRSTUVWXYZABCDEFGHKKLMNOPQRSTUVWXYZABCDEFGHIJOOPQRSTUVWXYZABCDEFGHIJKLMN
Polyalphabetic Cipher 
•Beuford Cipher 
TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMHIWVOTQSXCOFYMXWBXWZCQWMTMPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAAZYXWVUTSRQPONMLKJIHGFEDCBMMLKJIHGFEDCBAZYXWVUTSRQPONIIHGFEDCBAZYXWVUTSRQPONMLKJKKJIHGFEDCBAZYXWVUTSRQPONMLOONMLKJIHGFEDCBAZYXWVUTSRQP
Polyalphabetic Cipher 
•Varian Beuford Cipher 
TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMGHVUNSQRWBPEXLWVAWVABPVLSLPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAZYXWVUTSRQPONMLKJIHGFEDCBAMLKJIHGFEDCBAZYXWVUTSRQPONMIHGFEDCBAZYXWVUTSRQPONMLKJIKJIHGFEDCBAZYXWVUTSRQPONMLKONMLKJIHGFEDCBAZYXWVUTSRQPO
Polyalphabetic Cipher 
•Autokey Cipher 
•Book Chiper 
–Mengambil kunci dari suatu alamat buku 
TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMTEMPATKULIAHCALONPENPlaintext
Transposition Cipher 
•Reverse Cipher 
–AHAS UGNE PNOLA CTAP METMO KIMA 
•Rail Fence cipher 
–JLN AIR NYGA ATA AKLU AGOY KRA 
•Geometric Figure 
–KSEDIR IFERAP TRHA NAGO
Transposition Cipher 
•Row Transposition Cipher 
Chipertext : EAPTM KILTU HLAAC NNEOP UHAGS AAAAA 
–Kunci: 
TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413R41532TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAAPlaintextAMIKOMKeyword142356Kunci
Transposition Cipher 
•Block(Cloumnar) Transposition Cipher 
Chipertext : EKH NUAA ILNHA PLAE AATTAO GAMUC PSA 
PlaintextTEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413R41532TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAA
Transposition Cipher 
•Nihilist Transposition Cipher 
Chipertext : NNEO PEAP TMUH AGSH LAAC KIL TUAA AAA 
TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413TEMPA2EAPTMTKULI5KILTUAHCAL4HLAACONPEN1NNEOPGUSAH3UHAGSAAAAA6AAAAAPlaintext
Transposition Cipher 
•Diagonal Transposition Cipher 
Chipertext : EAKHI PTLLN UNAT MUAE JAAAO CPGA ASA 
TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAAPlaintext
Transposition Cipher 
•ADFGVX Product Transposition Cipher 
Plaintext : AMIKOM 
Intermediate : GV XX XF AA VD XX 
ADFGVXAKZWR1FD9B6CL5FQ7JFGXGEVY3ANV8ODH02XU4ISTM
Transposition Cipher 
•Plaintext : AMIKOM 
•Intermediate : GV XX XF AA VD XX 
–Kemudian dilakukan transposisi dengan suatu kunci 
–mis key : DASI (2143) 
–Ciphertext : VFDGXV XAXXAX 
2143GVXXVGXXXFAAFXAAVDXXDVXX

More Related Content

Viewers also liked

5 Macam Metode Dasar Kriptografi
5 Macam Metode Dasar Kriptografi5 Macam Metode Dasar Kriptografi
5 Macam Metode Dasar Kriptografi
Roziq Bahtiar
 
Steganografia ne imazhe
Steganografia ne imazheSteganografia ne imazhe
Steganografia ne imazhe
Markelian Laho
 
Nota ulangkaji mte3114 topik 3
Nota ulangkaji mte3114   topik 3Nota ulangkaji mte3114   topik 3
Nota ulangkaji mte3114 topik 3
LeeChing Tan
 
Pengantar kriptografi
Pengantar kriptografiPengantar kriptografi
Pengantar kriptografi
Soleh Hidayat
 

Viewers also liked (20)

5 Macam Metode Dasar Kriptografi
5 Macam Metode Dasar Kriptografi5 Macam Metode Dasar Kriptografi
5 Macam Metode Dasar Kriptografi
 
Jaringan Komputer dan Internet 13
Jaringan Komputer dan Internet 13Jaringan Komputer dan Internet 13
Jaringan Komputer dan Internet 13
 
Kriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hariKriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hari
 
Steganografia ne imazhe
Steganografia ne imazheSteganografia ne imazhe
Steganografia ne imazhe
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
Kriptografi - Algoritma Diffie Hellman
Kriptografi - Algoritma Diffie HellmanKriptografi - Algoritma Diffie Hellman
Kriptografi - Algoritma Diffie Hellman
 
Konsep kriptografi
Konsep kriptografiKonsep kriptografi
Konsep kriptografi
 
Nota ulangkaji mte3114 topik 3
Nota ulangkaji mte3114   topik 3Nota ulangkaji mte3114   topik 3
Nota ulangkaji mte3114 topik 3
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
Teknik Enkripsi Sederhana - Kriptografi
Teknik Enkripsi Sederhana - KriptografiTeknik Enkripsi Sederhana - Kriptografi
Teknik Enkripsi Sederhana - Kriptografi
 
Pengantar kriptografi
Pengantar kriptografiPengantar kriptografi
Pengantar kriptografi
 
Kriptografi - Data Encryption Standard
Kriptografi - Data Encryption StandardKriptografi - Data Encryption Standard
Kriptografi - Data Encryption Standard
 
04 kriptografi
04 kriptografi04 kriptografi
04 kriptografi
 
2863344
28633442863344
2863344
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 

More from likut101010 (17)

Basis data relasional
Basis data relasionalBasis data relasional
Basis data relasional
 
Model relational
Model relationalModel relational
Model relational
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Kriptografi modern
Kriptografi modernKriptografi modern
Kriptografi modern
 
System informasi basis data
System informasi basis dataSystem informasi basis data
System informasi basis data
 
Kriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hariKriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hari
 
Kriptografi klasik
Kriptografi klasikKriptografi klasik
Kriptografi klasik
 
Kriptografi jawa
Kriptografi jawaKriptografi jawa
Kriptografi jawa
 
World wide web security
World wide web securityWorld wide web security
World wide web security
 
Fungsi hash
Fungsi hashFungsi hash
Fungsi hash
 
Keamanan e bisnis
Keamanan e bisnisKeamanan e bisnis
Keamanan e bisnis
 
Digital signature
Digital signatureDigital signature
Digital signature
 
keamanan sistem operasi
keamanan sistem operasikeamanan sistem operasi
keamanan sistem operasi
 
Keamanan komputer
Keamanan komputerKeamanan komputer
Keamanan komputer
 
Protokol keamanan
Protokol keamananProtokol keamanan
Protokol keamanan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Firewall
FirewallFirewall
Firewall
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

Kriptografi

  • 2. Kritografi •Kritografi “kuno” –Subtitusi Cipher –Transposisi Cipher •Kriptografi Modern
  • 3. Kriptografi Kuno •Subtitution Cipher –Monoalphabetic Cipher –Polyalphabetic Cipher •Transposition Cipher –Mirror/Reverse, Rail Fence, Geometric Figure –Row Transposition Cipher –Block Transposition Cipher –ADVGFX Product Cipher
  • 4. Monoalphabetic Cipher •Caesar Chiper –L FDPH L VDZ L FRQTXHUHG –I CAME I SAW I CONQUERED •Mixed Monoalphabetic Cipher –A M I K O M –D C W E H C PlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherDEFGHIJKLMNOPQRSTUVWXYZABCPlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherDKVQFIBJWPESCXHTMYAUOLRGZN
  • 5. Monoalphabetic Cipher •Easier Monoalphabetic Cipher –B E R D A S I –M O C K A D S •Kelemahan : –Frekuensi kemunculan huruf tidak dapat dihilangkan PlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherAMIKOPQRSTUVWXYZBCDEFGHJLN
  • 6. Polyalphabetic Cipher •Vigenere CiPHER TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMTQUZOFKGTSOTCMTYBBEZOEGMHMPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAABCDEFGHIJKLMNOPQRSTUVWXYZMMNOPQRSTUVWXYZABCDEFGHIJKLIIJKLMNOPQRSTUVWXYZABCDEFGHKKLMNOPQRSTUVWXYZABCDEFGHIJOOPQRSTUVWXYZABCDEFGHIJKLMN
  • 7. Polyalphabetic Cipher •Beuford Cipher TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMHIWVOTQSXCOFYMXWBXWZCQWMTMPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAAZYXWVUTSRQPONMLKJIHGFEDCBMMLKJIHGFEDCBAZYXWVUTSRQPONIIHGFEDCBAZYXWVUTSRQPONMLKJKKJIHGFEDCBAZYXWVUTSRQPONMLOONMLKJIHGFEDCBAZYXWVUTSRQP
  • 8. Polyalphabetic Cipher •Varian Beuford Cipher TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMGHVUNSQRWBPEXLWVAWVABPVLSLPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAZYXWVUTSRQPONMLKJIHGFEDCBAMLKJIHGFEDCBAZYXWVUTSRQPONMIHGFEDCBAZYXWVUTSRQPONMLKJIKJIHGFEDCBAZYXWVUTSRQPONMLKONMLKJIHGFEDCBAZYXWVUTSRQPO
  • 9. Polyalphabetic Cipher •Autokey Cipher •Book Chiper –Mengambil kunci dari suatu alamat buku TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMTEMPATKULIAHCALONPENPlaintext
  • 10. Transposition Cipher •Reverse Cipher –AHAS UGNE PNOLA CTAP METMO KIMA •Rail Fence cipher –JLN AIR NYGA ATA AKLU AGOY KRA •Geometric Figure –KSEDIR IFERAP TRHA NAGO
  • 11. Transposition Cipher •Row Transposition Cipher Chipertext : EAPTM KILTU HLAAC NNEOP UHAGS AAAAA –Kunci: TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413R41532TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAAPlaintextAMIKOMKeyword142356Kunci
  • 12. Transposition Cipher •Block(Cloumnar) Transposition Cipher Chipertext : EKH NUAA ILNHA PLAE AATTAO GAMUC PSA PlaintextTEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413R41532TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAA
  • 13. Transposition Cipher •Nihilist Transposition Cipher Chipertext : NNEO PEAP TMUH AGSH LAAC KIL TUAA AAA TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413TEMPA2EAPTMTKULI5KILTUAHCAL4HLAACONPEN1NNEOPGUSAH3UHAGSAAAAA6AAAAAPlaintext
  • 14. Transposition Cipher •Diagonal Transposition Cipher Chipertext : EAKHI PTLLN UNAT MUAE JAAAO CPGA ASA TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAAPlaintext
  • 15. Transposition Cipher •ADFGVX Product Transposition Cipher Plaintext : AMIKOM Intermediate : GV XX XF AA VD XX ADFGVXAKZWR1FD9B6CL5FQ7JFGXGEVY3ANV8ODH02XU4ISTM
  • 16. Transposition Cipher •Plaintext : AMIKOM •Intermediate : GV XX XF AA VD XX –Kemudian dilakukan transposisi dengan suatu kunci –mis key : DASI (2143) –Ciphertext : VFDGXV XAXXAX 2143GVXXVGXXXFAAFXAAVDXXDVXX