Upcoming SlideShare
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Standard text messaging rates apply

# Dasar-Dasar Keamanan Sistem Informasi

2,672
views

Published on

Published in: Technology

0 Likes
Statistics
Notes
• Full Name
Comment goes here.

Are you sure you want to Yes No
• Be the first to comment

• Be the first to like this

Views
Total Views
2,672
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
89
0
Likes
0
Embeds 0
No embeds

No notes for slide

### Transcript

• 1. #3 Keamanan Sistem Informasi Berbasis Internet Dasar-Dasar Keamanan Sistem Informasi Wildan Maulana wildan.m@openthinklabs.com http://computersecurity.openthinklabs.com/
• 2. Selayang Pandang● Terminologi ● Public-key● Enkripsi cryptography lawan ● Elemen dari Enkripsi symmetric ● Substitution Cipher cryptography dengan Caesar Cipher ● Data Encryption ● ROT13 Standard (DES) ● Multiple-letter Encryption ● Memecahkan DES ● Enigma Rotor Machine ● Bahan Bacaan DES ● Penggunaan Kunci ● Aplikasi dari Enkripsi ● Hash function – integrity checking
• 3. TerminologiKriptografi (cryptography) merupakan ilmu dan seni untuk menjaga pesan agar aman
• 4. EnkripsiE(M) = C D(C) = M Img:src=http://en.wikipedia.org/wiki/Cryptography
• 5. Elemen dari Enkripsi● Algoritma dari Enkripsi dan Dekripsi● Kunci yang digunakan dan panjangnya kunci● Plaintext● Ciphertext
• 6. Substitution Cipherdengan Caesar Cipher Img:src=http://en.wikipedia.org/wiki/Caesar_cipher
• 7. ROT13 Img:src=http://en.wikipedia.org/wiki/ROT13
• 8. Multiple-letter encryption Ex : Playfair cipher
• 9. Playfair ExampleThe Key : The Message : Hide the gold in the tree stump. HI DE TH EG OL DI NT HE TR EX ES TU MP
• 10. The pair HI forms a rectangle, replace it with BM
• 11. The pair DE is in a column, replace it with OD
• 12. The pair TH forms a rectangle, replace it with ZB
• 13. The pair EG forms a rectangle, replace it with XD
• 14. The pair OL forms a rectangle, replace it with NA
• 15. Playfair Example The Result Hide the gold in the tree stumpBMODZBXDNABEKUDMUIXMMOUVIF
• 16. Enigma Rotor Machine Img:src=http://en.wikipedia.org/wiki/Enigma_rotor_details
• 17. Penggunaan Kunci● Keyspace (K) : Rentang dari kemungkinan angka (harga) dari kunci K EK(M) = C DK(M) = M
• 18. Aplikasi dari Enkripsi● Pretty Good Privacy (PGP)● Secure Shell (SSH)
• 19. Public-key cryptography lawan symmetric cryptography
• 20. Data Encryption Standard (DES) The Feistel function (F function) of DES
• 21. Memecahkan DES● http://www.distributed.net/● EFF DES cracker
• 22. Hash function - integrity checking● MD5● SHA
• 23. Q&Ahttp://computersecurity.openthinklabs.com/
• 24. Reference● Budi Rahardjo: Keamanan Sistem Informasi Berbasis Internet, 1999