ikh323-02

956 views

Published on

Published in: Technology, Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
956
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
39
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

ikh323-02

  1. 1. Kriptografi2011-2012-3 Anung Ariwibowo 1
  2. 2.  Kriptografi dan Sistem Keamanan Komputer  Standar Sistem Keamanan  Enkripsi Kunci Simetrik  Number Theory  Enkripsi Kunci Publik  Autentikasi Pesan dan Fungsi Hash2011-2012-3 Anung Ariwibowo 2
  3. 3.  Jaminan yang diberikan oleh protokol komunikasi  Lima kategori dan Empat belas layanan  Authentication  Jaminan keaslihan pihak-pihak yang terlibat dalam komunikasi 1. Peer-entity 2. Data-Origin2011-2012-3 Anung Ariwibowo 3
  4. 4.  Access Control  Siapa yang boleh mengakses sumber daya Apa pada waktu Kapan dengan cara Bagaimana (Who, What, When, How)  Data Confidentiality 1. Connection confidentiality 2. Connectionless confidentiality 3. Selective-field confidentiality 4. Traffic-flow confidentiality2011-2012-3 Anung Ariwibowo 4
  5. 5.  Data Integrity 1. Connection integrity with Recovery 2. Connection integrity without Recovery 3. Selective-field connection Integrity 4. Connectionless integrity 5. Selective-field connectionless integrity  Nonrepudiation 1. Origin nonrepudiation 2. Destination nonrepudiation2011-2012-3 Anung Ariwibowo 5
  6. 6.  Implementasi keamanan pada protokol dan lapis-lapis komunikasi  Specific security mechanisms  Encipherment  Digital Signature  Access Control  Data Integrity  Authentication Exchange  Traffic Padding  Routing Control  Notarization2011-2012-3 Anung Ariwibowo 6
  7. 7.  Pervasive security mechanisms  Tidak spesifik pada layer atau protokol tertentu  Trusted Functionality  Security Label  Event detection  Security audit trail  Security recovery2011-2012-3 Anung Ariwibowo 7
  8. 8.  Berbagai bentuk kegiatan yang membuat informasi sebuah organisasi menjadi terancam  Passive attack  Menggunakan informasi, tidak mengubah sistem  Sulit terdeteksi  Message transmission  Traffic analysis2011-2012-3 Anung Ariwibowo 8
  9. 9.  Active attack  Berpotensi mengubah informasi  Masquerade  Replay  Message modification  Denial of Service2011-2012-3 Anung Ariwibowo 11
  10. 10.  Active attack  Mudah terdeteksi  Sulit diatasi  Recovery2011-2012-3 Anung Ariwibowo 12
  11. 11.  Pengirim  Penerima  Secure-channel  Opponent  Arbiter2011-2012-3 Anung Ariwibowo 13
  12. 12.  Information System  Opponent  Access channel  Gatekeeper2011-2012-3 Anung Ariwibowo 15
  13. 13.  Stallings, "Cryptography and Network Security"http://williamstallings.com/Cryptography/  Schneier, "Applied Cryptography" http://www.schneier.com/book-applied.html  Thomas L Noack, http://ece.uprm.edu/~noack/crypto/  Slides tjerdastangkas.blogspot.com/search/label/ikh3232011-2012-3 Anung Ariwibowo 17

×