• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Dasar-Dasar Keamanan Sistem Informasi
 

Dasar-Dasar Keamanan Sistem Informasi

on

  • 2,624 views

 

Statistics

Views

Total Views
2,624
Views on SlideShare
2,579
Embed Views
45

Actions

Likes
0
Downloads
66
Comments
0

1 Embed 45

http://jujo00obo2o234ungd3t8qjfcjrs3o6k-a-sites-opensocial.googleusercontent.com 45

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Dasar-Dasar Keamanan Sistem Informasi Dasar-Dasar Keamanan Sistem Informasi Presentation Transcript

    • #3 Keamanan Sistem Informasi Berbasis Internet Dasar-Dasar Keamanan Sistem Informasi Wildan Maulana wildan.m@openthinklabs.com http://computersecurity.openthinklabs.com/
    • Selayang Pandang● Terminologi ● Public-key● Enkripsi cryptography lawan ● Elemen dari Enkripsi symmetric ● Substitution Cipher cryptography dengan Caesar Cipher ● Data Encryption ● ROT13 Standard (DES) ● Multiple-letter Encryption ● Memecahkan DES ● Enigma Rotor Machine ● Bahan Bacaan DES ● Penggunaan Kunci ● Aplikasi dari Enkripsi ● Hash function – integrity checking
    • TerminologiKriptografi (cryptography) merupakan ilmu dan seni untuk menjaga pesan agar aman
    • EnkripsiE(M) = C D(C) = M Img:src=http://en.wikipedia.org/wiki/Cryptography
    • Elemen dari Enkripsi● Algoritma dari Enkripsi dan Dekripsi● Kunci yang digunakan dan panjangnya kunci● Plaintext● Ciphertext
    • Substitution Cipherdengan Caesar Cipher Img:src=http://en.wikipedia.org/wiki/Caesar_cipher
    • ROT13 Img:src=http://en.wikipedia.org/wiki/ROT13
    • Multiple-letter encryption Ex : Playfair cipher
    • Playfair ExampleThe Key : The Message : Hide the gold in the tree stump. HI DE TH EG OL DI NT HE TR EX ES TU MP
    • The pair HI forms a rectangle, replace it with BM
    • The pair DE is in a column, replace it with OD
    • The pair TH forms a rectangle, replace it with ZB
    • The pair EG forms a rectangle, replace it with XD
    • The pair OL forms a rectangle, replace it with NA
    • Playfair Example The Result Hide the gold in the tree stumpBMODZBXDNABEKUDMUIXMMOUVIF
    • Enigma Rotor Machine Img:src=http://en.wikipedia.org/wiki/Enigma_rotor_details
    • Penggunaan Kunci● Keyspace (K) : Rentang dari kemungkinan angka (harga) dari kunci K EK(M) = C DK(M) = M
    • Aplikasi dari Enkripsi● Pretty Good Privacy (PGP)● Secure Shell (SSH)
    • Public-key cryptography lawan symmetric cryptography
    • Data Encryption Standard (DES) The Feistel function (F function) of DES
    • Memecahkan DES● http://www.distributed.net/● EFF DES cracker
    • Hash function - integrity checking● MD5● SHA
    • Q&Ahttp://computersecurity.openthinklabs.com/
    • Reference● Budi Rahardjo: Keamanan Sistem Informasi Berbasis Internet, 1999