SlideShare a Scribd company logo
Kriptografi
Kritografi 
•Kritografi “kuno” 
–Subtitusi Cipher 
–Transposisi Cipher 
•Kriptografi Modern
Kriptografi Kuno 
•Subtitution Cipher 
–Monoalphabetic Cipher 
–Polyalphabetic Cipher 
•Transposition Cipher 
–Mirror/Reverse, Rail Fence, Geometric Figure 
–Row Transposition Cipher 
–Block Transposition Cipher 
–ADVGFX Product Cipher
Monoalphabetic Cipher 
•Caesar Chiper 
–L FDPH L VDZ L FRQTXHUHG 
–I CAME I SAW I CONQUERED 
•Mixed Monoalphabetic Cipher 
–A M I K O M 
–D C W E H C 
PlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherDEFGHIJKLMNOPQRSTUVWXYZABCPlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherDKVQFIBJWPESCXHTMYAUOLRGZN
Monoalphabetic Cipher 
•Easier Monoalphabetic Cipher 
–B E R D A S I 
–M O C K A D S 
•Kelemahan : 
–Frekuensi kemunculan huruf tidak dapat dihilangkan 
PlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherAMIKOPQRSTUVWXYZBCDEFGHJLN
Polyalphabetic Cipher 
•Vigenere CiPHER 
TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMTQUZOFKGTSOTCMTYBBEZOEGMHMPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAABCDEFGHIJKLMNOPQRSTUVWXYZMMNOPQRSTUVWXYZABCDEFGHIJKLIIJKLMNOPQRSTUVWXYZABCDEFGHKKLMNOPQRSTUVWXYZABCDEFGHIJOOPQRSTUVWXYZABCDEFGHIJKLMN
Polyalphabetic Cipher 
•Beuford Cipher 
TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMHIWVOTQSXCOFYMXWBXWZCQWMTMPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAAZYXWVUTSRQPONMLKJIHGFEDCBMMLKJIHGFEDCBAZYXWVUTSRQPONIIHGFEDCBAZYXWVUTSRQPONMLKJKKJIHGFEDCBAZYXWVUTSRQPONMLOONMLKJIHGFEDCBAZYXWVUTSRQP
Polyalphabetic Cipher 
•Varian Beuford Cipher 
TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMGHVUNSQRWBPEXLWVAWVABPVLSLPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAZYXWVUTSRQPONMLKJIHGFEDCBAMLKJIHGFEDCBAZYXWVUTSRQPONMIHGFEDCBAZYXWVUTSRQPONMLKJIKJIHGFEDCBAZYXWVUTSRQPONMLKONMLKJIHGFEDCBAZYXWVUTSRQPO
Polyalphabetic Cipher 
•Autokey Cipher 
•Book Chiper 
–Mengambil kunci dari suatu alamat buku 
TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMTEMPATKULIAHCALONPENPlaintext
Transposition Cipher 
•Reverse Cipher 
–AHAS UGNE PNOLA CTAP METMO KIMA 
•Rail Fence cipher 
–JLN AIR NYGA ATA AKLU AGOY KRA 
•Geometric Figure 
–KSEDIR IFERAP TRHA NAGO
Transposition Cipher 
•Row Transposition Cipher 
Chipertext : EAPTM KILTU HLAAC NNEOP UHAGS AAAAA 
–Kunci: 
TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413R41532TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAAPlaintextAMIKOMKeyword142356Kunci
Transposition Cipher 
•Block(Cloumnar) Transposition Cipher 
Chipertext : EKH NUAA ILNHA PLAE AATTAO GAMUC PSA 
PlaintextTEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413R41532TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAA
Transposition Cipher 
•Nihilist Transposition Cipher 
Chipertext : NNEO PEAP TMUH AGSH LAAC KIL TUAA AAA 
TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413TEMPA2EAPTMTKULI5KILTUAHCAL4HLAACONPEN1NNEOPGUSAH3UHAGSAAAAA6AAAAAPlaintext
Transposition Cipher 
•Diagonal Transposition Cipher 
Chipertext : EAKHI PTLLN UNAT MUAE JAAAO CPGA ASA 
TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAAPlaintext
Transposition Cipher 
•ADFGVX Product Transposition Cipher 
Plaintext : AMIKOM 
Intermediate : GV XX XF AA VD XX 
ADFGVXAKZWR1FD9B6CL5FQ7JFGXGEVY3ANV8ODH02XU4ISTM
Transposition Cipher 
•Plaintext : AMIKOM 
•Intermediate : GV XX XF AA VD XX 
–Kemudian dilakukan transposisi dengan suatu kunci 
–mis key : DASI (2143) 
–Ciphertext : VFDGXV XAXXAX 
2143GVXXVGXXXFAAFXAAVDXXDVXX

More Related Content

Viewers also liked

5 Macam Metode Dasar Kriptografi
5 Macam Metode Dasar Kriptografi5 Macam Metode Dasar Kriptografi
5 Macam Metode Dasar KriptografiRoziq Bahtiar
 
Kriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hariKriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hari
Universitas Bina Darma Palembang
 
Steganografia ne imazhe
Steganografia ne imazheSteganografia ne imazhe
Steganografia ne imazheMarkelian Laho
 
Kriptografi
KriptografiKriptografi
Kriptografi
SiintaEllisa68
 
Kriptografi - Algoritma Diffie Hellman
Kriptografi - Algoritma Diffie HellmanKriptografi - Algoritma Diffie Hellman
Kriptografi - Algoritma Diffie Hellman
KuliahKita
 
Konsep kriptografi
Konsep kriptografiKonsep kriptografi
Konsep kriptografi
Arya Sasmita
 
Nota ulangkaji mte3114 topik 3
Nota ulangkaji mte3114   topik 3Nota ulangkaji mte3114   topik 3
Nota ulangkaji mte3114 topik 3LeeChing Tan
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
Antony Alex
 
Kriptografi
KriptografiKriptografi
Kriptografi
WhulandDhari Taslim
 
Teknik Enkripsi Sederhana - Kriptografi
Teknik Enkripsi Sederhana - KriptografiTeknik Enkripsi Sederhana - Kriptografi
Teknik Enkripsi Sederhana - Kriptografi
Dani Royman Simanjuntak
 
Pengantar kriptografi
Pengantar kriptografiPengantar kriptografi
Pengantar kriptografiSoleh Hidayat
 
Kriptografi - Data Encryption Standard
Kriptografi - Data Encryption StandardKriptografi - Data Encryption Standard
Kriptografi - Data Encryption Standard
KuliahKita
 
2863344
28633442863344
2863344
Syam Ancha
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
Pratik Poddar
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 

Viewers also liked (20)

5 Macam Metode Dasar Kriptografi
5 Macam Metode Dasar Kriptografi5 Macam Metode Dasar Kriptografi
5 Macam Metode Dasar Kriptografi
 
Jaringan Komputer dan Internet 13
Jaringan Komputer dan Internet 13Jaringan Komputer dan Internet 13
Jaringan Komputer dan Internet 13
 
Kriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hariKriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hari
 
Steganografia ne imazhe
Steganografia ne imazheSteganografia ne imazhe
Steganografia ne imazhe
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
Kriptografi - Algoritma Diffie Hellman
Kriptografi - Algoritma Diffie HellmanKriptografi - Algoritma Diffie Hellman
Kriptografi - Algoritma Diffie Hellman
 
Konsep kriptografi
Konsep kriptografiKonsep kriptografi
Konsep kriptografi
 
Nota ulangkaji mte3114 topik 3
Nota ulangkaji mte3114   topik 3Nota ulangkaji mte3114   topik 3
Nota ulangkaji mte3114 topik 3
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
Teknik Enkripsi Sederhana - Kriptografi
Teknik Enkripsi Sederhana - KriptografiTeknik Enkripsi Sederhana - Kriptografi
Teknik Enkripsi Sederhana - Kriptografi
 
Pengantar kriptografi
Pengantar kriptografiPengantar kriptografi
Pengantar kriptografi
 
Kriptografi - Data Encryption Standard
Kriptografi - Data Encryption StandardKriptografi - Data Encryption Standard
Kriptografi - Data Encryption Standard
 
04 kriptografi
04 kriptografi04 kriptografi
04 kriptografi
 
2863344
28633442863344
2863344
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 

More from likut101010

Basis data relasional
Basis data relasionalBasis data relasional
Basis data relasional
likut101010
 
Model relational
Model relationalModel relational
Model relational
likut101010
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
likut101010
 
Kriptografi modern
Kriptografi modernKriptografi modern
Kriptografi modern
likut101010
 
System informasi basis data
System informasi basis dataSystem informasi basis data
System informasi basis data
likut101010
 
Kriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hariKriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hari
likut101010
 
Kriptografi klasik
Kriptografi klasikKriptografi klasik
Kriptografi klasik
likut101010
 
Kriptografi jawa
Kriptografi jawaKriptografi jawa
Kriptografi jawa
likut101010
 
World wide web security
World wide web securityWorld wide web security
World wide web security
likut101010
 
Fungsi hash
Fungsi hashFungsi hash
Fungsi hash
likut101010
 
Keamanan e bisnis
Keamanan e bisnisKeamanan e bisnis
Keamanan e bisnis
likut101010
 
Digital signature
Digital signatureDigital signature
Digital signature
likut101010
 
keamanan sistem operasi
keamanan sistem operasikeamanan sistem operasi
keamanan sistem operasi
likut101010
 
Keamanan komputer
Keamanan komputerKeamanan komputer
Keamanan komputer
likut101010
 
Protokol keamanan
Protokol keamananProtokol keamanan
Protokol keamanan
likut101010
 
Cybercrime
CybercrimeCybercrime
Cybercrime
likut101010
 
Firewall
FirewallFirewall
Firewall
likut101010
 

More from likut101010 (17)

Basis data relasional
Basis data relasionalBasis data relasional
Basis data relasional
 
Model relational
Model relationalModel relational
Model relational
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Kriptografi modern
Kriptografi modernKriptografi modern
Kriptografi modern
 
System informasi basis data
System informasi basis dataSystem informasi basis data
System informasi basis data
 
Kriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hariKriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hari
 
Kriptografi klasik
Kriptografi klasikKriptografi klasik
Kriptografi klasik
 
Kriptografi jawa
Kriptografi jawaKriptografi jawa
Kriptografi jawa
 
World wide web security
World wide web securityWorld wide web security
World wide web security
 
Fungsi hash
Fungsi hashFungsi hash
Fungsi hash
 
Keamanan e bisnis
Keamanan e bisnisKeamanan e bisnis
Keamanan e bisnis
 
Digital signature
Digital signatureDigital signature
Digital signature
 
keamanan sistem operasi
keamanan sistem operasikeamanan sistem operasi
keamanan sistem operasi
 
Keamanan komputer
Keamanan komputerKeamanan komputer
Keamanan komputer
 
Protokol keamanan
Protokol keamananProtokol keamanan
Protokol keamanan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Firewall
FirewallFirewall
Firewall
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Kriptografi

  • 2. Kritografi •Kritografi “kuno” –Subtitusi Cipher –Transposisi Cipher •Kriptografi Modern
  • 3. Kriptografi Kuno •Subtitution Cipher –Monoalphabetic Cipher –Polyalphabetic Cipher •Transposition Cipher –Mirror/Reverse, Rail Fence, Geometric Figure –Row Transposition Cipher –Block Transposition Cipher –ADVGFX Product Cipher
  • 4. Monoalphabetic Cipher •Caesar Chiper –L FDPH L VDZ L FRQTXHUHG –I CAME I SAW I CONQUERED •Mixed Monoalphabetic Cipher –A M I K O M –D C W E H C PlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherDEFGHIJKLMNOPQRSTUVWXYZABCPlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherDKVQFIBJWPESCXHTMYAUOLRGZN
  • 5. Monoalphabetic Cipher •Easier Monoalphabetic Cipher –B E R D A S I –M O C K A D S •Kelemahan : –Frekuensi kemunculan huruf tidak dapat dihilangkan PlainABCDEFGHIJKLMNOPQRSTUVWXYZCipherAMIKOPQRSTUVWXYZBCDEFGHJLN
  • 6. Polyalphabetic Cipher •Vigenere CiPHER TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMTQUZOFKGTSOTCMTYBBEZOEGMHMPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAABCDEFGHIJKLMNOPQRSTUVWXYZMMNOPQRSTUVWXYZABCDEFGHIJKLIIJKLMNOPQRSTUVWXYZABCDEFGHKKLMNOPQRSTUVWXYZABCDEFGHIJOOPQRSTUVWXYZABCDEFGHIJKLMN
  • 7. Polyalphabetic Cipher •Beuford Cipher TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMHIWVOTQSXCOFYMXWBXWZCQWMTMPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAAZYXWVUTSRQPONMLKJIHGFEDCBMMLKJIHGFEDCBAZYXWVUTSRQPONIIHGFEDCBAZYXWVUTSRQPONMLKJKKJIHGFEDCBAZYXWVUTSRQPONMLOONMLKJIHGFEDCBAZYXWVUTSRQP
  • 8. Polyalphabetic Cipher •Varian Beuford Cipher TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMAMIKOMAMIKOMAMIKOMAMGHVUNSQRWBPEXLWVAWVABPVLSLPlaintextCiphertextABCDEFGHIJKLMNOPQRSTUVWXYZAZYXWVUTSRQPONMLKJIHGFEDCBAMLKJIHGFEDCBAZYXWVUTSRQPONMIHGFEDCBAZYXWVUTSRQPONMLKJIKJIHGFEDCBAZYXWVUTSRQPONMLKONMLKJIHGFEDCBAZYXWVUTSRQPO
  • 9. Polyalphabetic Cipher •Autokey Cipher •Book Chiper –Mengambil kunci dari suatu alamat buku TEMPATKULIAHCALONPENGUSAHAKeywordAMIKOMTEMPATKULIAHCALONPENPlaintext
  • 10. Transposition Cipher •Reverse Cipher –AHAS UGNE PNOLA CTAP METMO KIMA •Rail Fence cipher –JLN AIR NYGA ATA AKLU AGOY KRA •Geometric Figure –KSEDIR IFERAP TRHA NAGO
  • 11. Transposition Cipher •Row Transposition Cipher Chipertext : EAPTM KILTU HLAAC NNEOP UHAGS AAAAA –Kunci: TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413R41532TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAAPlaintextAMIKOMKeyword142356Kunci
  • 12. Transposition Cipher •Block(Cloumnar) Transposition Cipher Chipertext : EKH NUAA ILNHA PLAE AATTAO GAMUC PSA PlaintextTEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413R41532TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAA
  • 13. Transposition Cipher •Nihilist Transposition Cipher Chipertext : NNEO PEAP TMUH AGSH LAAC KIL TUAA AAA TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413TEMPA2EAPTMTKULI5KILTUAHCAL4HLAACONPEN1NNEOPGUSAH3UHAGSAAAAA6AAAAAPlaintext
  • 14. Transposition Cipher •Diagonal Transposition Cipher Chipertext : EAKHI PTLLN UNAT MUAE JAAAO CPGA ASA TEMPATKULIAHCALONPENGUSAHA1234512345Key(W)25413TEMPAEAPTMTKULIKILTUAHCALHLAACONPENNNEOPGUSAHUHAGSAAAAAAAAAAPlaintext
  • 15. Transposition Cipher •ADFGVX Product Transposition Cipher Plaintext : AMIKOM Intermediate : GV XX XF AA VD XX ADFGVXAKZWR1FD9B6CL5FQ7JFGXGEVY3ANV8ODH02XU4ISTM
  • 16. Transposition Cipher •Plaintext : AMIKOM •Intermediate : GV XX XF AA VD XX –Kemudian dilakukan transposisi dengan suatu kunci –mis key : DASI (2143) –Ciphertext : VFDGXV XAXXAX 2143GVXXVGXXXFAAFXAAVDXXDVXX