Download - 1-Intro dan Enkripsi Klasik.odp
![Page 1: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/1.jpg)
Keamanan Informasi & JaringanPertemuan 1
Baskoro Adi P.
![Page 2: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/2.jpg)
Sebelumnya...● Buku Panduan :
Cryptography and Network Security : Principles and Practices 5th edition
● Persentase nilai : Tugas : 50 % UTS : 25 % UAS : 25 %
![Page 3: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/3.jpg)
Garis Besar Materi● Enkripsi● Enkripsi● MAC, Digital Signatures, Digital
Certificates● Software Security● Web Application Security
![Page 4: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/4.jpg)
Definisi
![Page 5: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/5.jpg)
Computer Security
The protection afforded to an automated information system in order to attain theapplicable objectives of preserving the
Confidentiality, Integrity, and Availability of
information system resources (includes hardware, software, firmware, information/
data, and telecommunications).
![Page 6: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/6.jpg)
Objective● Security Objective :
Confidentiality Integrity Avalaibility
● Additional Objective : Authenticity Accountability
![Page 7: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/7.jpg)
OSI Security Architecture
![Page 8: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/8.jpg)
OSI Security Architecture● Security Attack/Threat :
Setiap tindakan yang ”menyerang” informasi rahasia yang dimiliki oleh seseorang
● Security Mechanism : Sebuah proses yang didesain utk
mendeteksi,mencegah,atau menanggulangi serangan
● Security Services : Digunakan untuk counter security attack,
biasanya terdiri dari beberapa security mechanism
![Page 9: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/9.jpg)
Security Attack● Passive Attack
Membaca Pesan
Analisa Traffic
![Page 10: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/10.jpg)
Security Attack (2)● Active Attack
Masquerade
Replay
![Page 11: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/11.jpg)
Security Attack (3)● Active Attack (2) :
Modifikasi Pesan
Denial of Service
![Page 12: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/12.jpg)
Security Services● Security Services (X.800)
Authentication Peer Origin Authentication Data Origin Authentication
Access Control Data Confidentiality Data Integrity Non-Repudiation
![Page 13: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/13.jpg)
Security Mechanism● Encipherment● Digital Signature● Access Control● Data Integrity● Authentication Exchange● Traffic Padding● Routing Control● Notarization
![Page 14: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/14.jpg)
Security Mechanism & Services
![Page 15: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/15.jpg)
Model untuk Keamanan Jaringan
![Page 16: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/16.jpg)
Enkripsi Klasik
![Page 17: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/17.jpg)
![Page 18: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/18.jpg)
Arti Pesan● AM HERE ABE SLANEY● COME ELSIE● NEVER● PREPARE TO MET THY GOD
Sumber : Sherlock Holmes – The Adventure of Dancing Man
![Page 19: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/19.jpg)
Model Enkripsi Simetris
![Page 20: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/20.jpg)
Istilah-Istilah● Plaintext : Teks asli
● Ciphertext : Teks yang telah dienkripsi
● Key : Kunci
● Cipher : Algoritma enkripsi
● Enciphering/Encryption : Proses mengubah plaintext menjadi ciphertext
● Deciphering/Decryption : Proses mengubah ciphertext menjadi plaintext
● Cryptography : Ilmu yang mempelajari enkripsi
● Cryptanalysis : Teknik mendekripsi pesan tanpa mengetahui detail dari enkripsinya
![Page 21: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/21.jpg)
Karakter Kriptografi● Kriptografi dibagi menjadi beberapa
bagian, yaitu : Berdasar jenis operasi :
Subtitusi Transposisi Campuran
Berdasar jumlah key yang digunakan : Simetris Asimetris
Berdasar pengolahan plaintext: Block Cipher Stream Cipher
![Page 22: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/22.jpg)
Metode Kriptoanalisis● Ada 2 cara untuk memecahkan suatu
metode enkripsi, yaitu : Brute Force Attack Cryptanalysis
![Page 23: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/23.jpg)
Teknik Subsitusi● Caesar Cipher● Monoalphabetic Cipher● Polyalphabetic Cipher● One-time Pad
![Page 24: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/24.jpg)
Caesar Cipher● Contoh :
● Transformasi :
● Rumus : C = E(k,p) = (p+k) mod 26
● Kelemahan?
![Page 25: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/25.jpg)
Monoalphabetic Cipher● Bekerja berdasarkan konsep permutasi● Setiap huruf dipetakan suatu huruf
tertentu● Contoh :
![Page 26: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/26.jpg)
Frekuensi Kemunculan
![Page 27: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/27.jpg)
Arti Pesan
![Page 28: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/28.jpg)
Vigenere Cipher (Polyalphabetic)
Contoh :
![Page 29: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/29.jpg)
One-time Pad● Penggunaan kunci dengan isi yang acak
dan sepanjang pesan, serta digunakan untuk sekali enkripsi
● Contoh :
![Page 30: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/30.jpg)
Teknik Transposisi● Teknik Rail-fence
● Enkripsi transposisi
![Page 31: 1-Intro dan Enkripsi Klasik.odp](https://reader033.vdocuments.pub/reader033/viewer/2022050806/577c78041a28abe0548e6353/html5/thumbnails/31.jpg)
Steganografi