Keamanan Jaringan, Sistem, Host, Data, dan Sistem Informasi
Transcription
Keamanan Jaringan, Sistem, Host, Data, dan Sistem Informasi
Management Information Systems MANAGING THE DIGITAL FIRM, 12TH EDITION GLOBAL EDITION Pertemuan ke-4 KEAMANAN JARINGAN, SISTEM, HOST, DATA, DAN SISTEM INFORMASI (diadopsi dari SECURING IS, Laudon and Laudon) Modified by: Dr. R. Rizal Isnanto, S.T., M.M., M.T. Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Learning Objectives • What are the most important tools and technologies for safeguarding information resources? 2 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Identity management software – Automates keeping track of all users and privileges – Authenticates users, protecting identities, controlling access • Authentication – – – – 3 Password systems Tokens Smart cards Biometric authentication Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Firewall: – Combination of hardware and software that prevents unauthorized users from accessing private networks – Technologies include: • Static packet filtering • Network address translation (NAT) • Application proxy filtering 4 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources A CORPORATE FIREWALL The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. FIGURE 8-5 5 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Intrusion detection systems: – Monitor hot spots on corporate networks to detect and deter intruders – Examines events as they are happening to discover attacks in progress • Antivirus and antispyware software: – Checks computers for presence of malware and can often eliminate it as well – Require continual updating • Unified threat management (UTM) systems 6 Management Information Systems Intrusion Detection System (IDS) • Intrusion Detection System (disingkat IDS) adalah sebuah aplikasi perangkat lunak atau perangkat keras yang dapat mendeteksi aktivitas yang mencurigakan dalam sebuah sistem atau jaringan. IDS dapat melakukan inspeksi terhadap lalu lintas inbound dan outbound dalam sebuah sistem atau jaringan, melakukan analisis dan mencari bukti dari percobaan intrusi (penyusupan). 7 © Pearson Education 2012 Management Information Systems Intrusion and Intrusion Detection • Intrusion : Attempting to break into or misuse your system. • Intruders may be from outside the network or legitimate users of the network. • Intrusion can be a physical, system or remote intrusion. 8 © Pearson Education 2012 Management Information Systems Intrusion Detection Systems (IDS) and Signature • Intrusion Detection Systems look for attack signatures, which are specific patterns that usually indicate malicious or suspicious intent. • Different ways of classifying an IDS IDS based on – – – – 9 anomaly detection signature based misuse host based network based © Pearson Education 2012 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Securing wireless networks – WEP security can provide some security by • Assigning unique name to network’s SSID and not broadcasting SSID • Using it with VPN technology – Wi-Fi Alliance finalized WAP2 specification, replacing WEP with stronger standards • Continually changing keys • Encrypted authentication system with central server 10 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Encryption: – Transforming text or data into ciphertext that cannot be read by unintended recipients – Two methods for encryption on networks • Secure Sockets Layer (SSL) and successor Transport Layer Security (TLS) • Secure Hypertext Transfer Protocol (SHTTP) 11 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Two methods of encryption – Symmetric key encryption • Sender and receiver use single, shared key – Public key encryption • Uses two, mathematically related keys: Public key and private key • Sender encrypts message with recipient’s public key • Recipient decrypts with private key 12 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources PUBLIC KEY ENCRYPTION FIGURE 8-6 13 A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Digital certificate: – Data file used to establish the identity of users and electronic assets for protection of online transactions – Uses a trusted third party, certification authority (CA), to validate a user’s identity – CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key • Public key infrastructure (PKI) – Use of public key cryptography working with certificate authority – Widely used in e-commerce 14 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources DIGITAL CERTIFICATES Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. FIGURE 8-7 15 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Ensuring system availability – Online transaction processing requires 100% availability, no downtime • Fault-tolerant computer systems – For continuous availability, e.g. stock markets – Contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service • High-availability computing – Helps recover quickly from crash – Minimizes, does not eliminate downtime 16 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Recovery-oriented computing – Designing systems that recover quickly with capabilities to help operators pinpoint and correct of faults in multi-component systems • Controlling network traffic – Deep packet inspection (DPI) • Video and music blocking • Security outsourcing – Managed security service providers (MSSPs) 17 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Security in the cloud – Responsibility for security resides with company owning the data – Firms must ensure providers provides adequate protection – Service level agreements (SLAs) • Securing mobile platforms – Security policies should include and cover any special requirements for mobile devices • E.g. updating smart phones with latest security patches, etc. 18 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources MWEB BUSINESS: HACKED Read the Interactive Session and discuss the following questions • What security and control problems are described in this case? • What people, organization, and technology factors contribute to these problems? • How secure is cloud computing? Explain your answer. • If you were in charge of your company’s information systems department, what issues would you want to clarify with prospective vendors? • Would you entrust your corporate systems to a cloud computing provider? Why or why not? 19 Management Information Systems CHAPTER 8: SECURING INFORMATION SYSTEMS Technologies and Tools for Protecting Information Resources • Ensuring software quality – Software metrics: Objective assessments of system in form of quantified measurements • • • • Number of transactions Online response time Payroll checks printed per hour Known bugs per hundred lines of code – Early and regular testing – Walkthrough: Review of specification or design document by small group of qualified people – Debugging: Process by which errors are eliminated 20 Communications, Networks, & Safeguards 6 McGraw-Hill Cyberthreats, Hackers, & Safeguards Problem: Internet was begun to foster collaboration among universities and scientists. They trusted each other. No security was built into the internet. Problem: The internet is open-access and is used by criminals who take advantage of the lack of built-in safeguards. Problem: Most people connect to the internet and use their computers in LANs. All it takes is one computer on a LAN that has been compromised for all computers on it to be vulnerable. McGraw-Hill Cyberthreats, Hackers, & Safeguards Cyberthreats Denial of Service Attacks Consist of making repeated requests of a computer or network device, thereby overloading it and denying access to legitimate users Used to target particular companies or individuals McGraw-Hill Cyberthreats, Hackers, & Safeguards Cyberthreats (continued) Worms (Malware) A program that copies itself repeatedly into a computer’s memory or disk drive May copy itself so much it crashes the infected computer Primarily target PCs running Microsoft Windows McGraw-Hill Cyberthreats, Hackers, & Safeguards Cyberthreats (continued) Viruses (Malware) Deviant program that hides on a disk, in an email, or in a web link that causes unexpected effects such as destroying or corrupting data Viruses are released at the rate of about one per day To see what the latest ones are, go to www.symantec.com/avcenter/vinfodb.html McGraw-Hill Cyberthreats, Hackers, & Safeguards Cyberthreats (continued) Trojan Horses (Malware) Programs that pretend to be a useful program such as a free game or a screensaver but that carry viruses or malicious instructions that damage your computer or install a backdoor or spyware Backdoors and spyware allow others to access your computer without your knowledge McGraw-Hill Cyberthreats, Hackers, & Safeguards Cyberthreats (continued) How they spread Via e-mail attachments By infected disks By clicking on infiltrated websites By downloading infected files from websites Through infiltrated Wi-Fi hotspots From one infected PC on a LAN to another What can you do about it? Install antivirus software and subscribe to the manufacturer’s automatic antivirus update service McGraw-Hill Cyberthreats, Hackers, & Safeguards Cyberthreats (continued) Cellphone Malware Spread via internet downloads, MMS attachments, and Bluetooth transfers Usually show up disguised as applications such as games, security patches, add-on functionalities, erotica, and free programs Protect your phone: Turn off Bluetooth discoverable mode Check security updates to learn about filenames to watch out for Install security software McGraw-Hill Cyberthreats, Hackers, & Safeguards Cyber Villains Hackers are either Computer enthusiasts, people who enjoy learning about programming and computers People who gain unauthorized access to computers or networks, often for fun or just to see if they can Two types: Thrill-seeker hackers: do it for the challenge White-hat hackers: do it to expose security flaws that can be fixed McGraw-Hill Cyberthreats, Hackers, & Safeguards Cyber Villains Crackers Malicious hackers who break into computers for malicious purposes Script kiddies are technically unsophisticated teenagers who use downloadable software for perform break-ins Hacktivists are hacker activists who break into systems for a political purpose Black-hat hackers are those who break into computers to steal or destroy information or to use it for illegal profit Cyberterrorists attack computer systems so as to bring physical or financial harm to groups, companies, or nations McGraw-Hill Cyberthreats, Hackers, & Safeguards Online Safety Use antivirus software, and keep it current Install a firewall to monitor network traffic and filter out undesirable types of traffic and undesirable sites Don’t use the same password for multiple sites Don’t give out any password information Use robust passwords: Minimum 8 characters with letters, numbers, characters 4cats is not a good password; f0UrK@tTz is safer McGraw-Hill Cyberthreats, Hackers, & Safeguards Online Safety (continued) Install antispyware software Encrypt financial and personal records so only you can read them Back up your data, so if your PC is attacked and must be reformatted, you can restore your data Never download from a website you don’t trust Consider biometric authentication McGraw-Hill Cyberthreats, Hackers, & Safeguards Online Safety (continued) Biometrics: science of measuring individual body characteristics Used in security devices Examples; hands, fingerprints, iris recognition, face recognition, voice recognition Now available on laptops McGraw-Hill Cyberthreats, Hackers, & Safeguards Online Safety (continued) Encryption Process of altering readable data into unreadable form to prevent unauthorized access Uses powerful mathematical ciphers to create coded messages that are difficult to break Unencrypted messages are known as plain text Encrypted text is known as cybertext Either private keys or public keys are used to encrypt and send and then to receive and decrypt messages McGraw-Hill Cyberthreats, Hackers, & Safeguards Online Safety (continued) Private Key encryption means the same secret key is used by both the sender and receiver to encrypt and decrypt a message Public Key encryption means that two keys are used; the recipient’s public key is given to the sender to encrypt the message; the receiver uses a private key to decrypt it McGraw-Hill Contoh Public Key Cryptosystem: RSA Teknik yang digunakan untuk penghitungan: FAST EXPONENTIATION Kita akan tengok terlebih dahulu konsep FAST EXPONENTIATION sebelum membahas Algoritma RSA McGraw-Hill FAST EXPONENTIATION 1. Konsep Modulo 2. Perpangkatan Cepat 3 8 Fast Exponentiation Algoritma kunci-publik seperti RSA, Elgamal, Rabin-Williams Cryptosystem, DSA, dan sebagainya, sederhana dalam perhitungannya namun sulit dalam implementasinya dalam perangkat lunak. Hal ini karena algoritma tersebut melakukan operasi perpangkatan dengan bilangan yang besar. Metode Fast Exponentiation digunakan untuk menghitung operasi pemangkatan besar bilangan bulat modulo dengan cepat. McGraw-Hill Konsep Modulo (1) Konsep Modulo merupakan bagian yang dibahas pada Matematika Diskret. Operasi modulo, misal: a mod b = c mempersyaratkan nilainilai a, b, dan c harus integer (bulat), dengan c merupakan sisa hasil-bagi bulat dari a/b div (a/b) Contoh: 10/3 = 3, sisa 1 maka 10 mod 3 = 1 Penggunaan kalkulator yang tidak ada fungsi mod-nya contoh: Berapa 124 mod 5? cara: 124 : 5 = 24.8 24 0.8 0.8*5 = 4 Sehingga, 124 mod 5 = 4, atau bisa ditulis: 124 4 mod 5 McGraw-Hill Konsep Modulo (2) Jika a mod b, dengan a < b, maka a mod b = a Jika a mod b, dengan a > b/2 dan a < b maka a mod b = a-b = - (b-a) Contoh: berapakah 31 mod 33? Jawab: a = 31, b = 33, dengan a < b (=31 < 33), sekaligus a > b/2 (= 31 > 33/2 = 16,5), maka dapat dituliskan: 31 mod 33 = 31 31-33 -2 mod 33 atau dapat ditulis: 31 31-33 -2 mod 33 yang merupakan cara penulisan cepat. Angka hasil modulo yang kecil lebih disukai lebih mudah penghitungannya pada fast exponentiation. Model penulisan lain (lebih panjang): 31 mod 33 = (31-33) mod 33 = -2 mod 33 = -2 McGraw-Hill FAST EXPONENTIATION McGraw-Hill Jadi hasil dari 311 mod 35 McGraw-Hill Contoh 1098 mod 11 1098 mod 11 ≡ 1064+32+2 10 mod 11 ≡ 10 ≡ (-1) mod 11 102 ≡ (-1)2 ≡ 1 mod 11 1032 ≡ (102)16 =116 ≡ 1 mod 11 1064 ≡ (1032)2 = 12 ≡ 1 mod 11 Jadi 1098 mod 11 ≡ 1064+32+2 ≡ 1064. 1032. 102 ≡ (1). (1). (1) ≡ 1 mod 11 McGraw-Hill 57237 mod 713 57237 = 57232 5724 572 572 mod 713 ≡ 572 ≡ (-141) mod 713 5722 ≡ (-141)2 ≡ 630 ≡ (-83) mod 713 5724 ≡ (5722) 2 ≡ (-83) 2 ≡ 472 ≡ (-241) mod 713 5728 ≡ (5724) 2 ≡ (-241) 2 ≡ 328 mod 713 57216 ≡ (5728) 2 ≡ 328 2 ≡ 634 ≡ (-79) mod 713 57232 ≡ (57216) 2 ≡ (-79) 2 ≡ 537 ≡ (-176) mod 713 Jadi 57237 mod 713 ≡ 57232 5724 572 ≡ (-176).(-241).(-141) ≡ (-12) mod 713 McGraw-Hill PR A (1 minggu) Dengan Fast Exponentiation, carilah: 1. 1535 mod 17 2. 2315 mod 29 3. 324 mod 8 4. 5105 mod 12 5. 737 mod 10 McGraw-Hill ENKRIPSI RSA 4 7 R S A Ronald Rivest, Adi Shamir, Leonard Adleman) RSA PUBLIC KEY ALGORITHM McGraw-Hill Everyone knows Bob’s public key. Anyone can do the public operation. McGraw-Hill Only Bob knows his own private key. It is not possible to find M, given only C and not the private key. It is not possible to find the private key, given the public key. Therefore, only Bob can do the private operation. McGraw-Hill Konversi Huruf ke Angka dalam RSA Dalam implementasinya, pesan m yang akan dienkripsi adalah berbentu teks, sehingga teks (rangkaian huruf/karakter) tersebut harus dinyatakan dalam sebuah angka. Cara mengkonversi adalah mengikuti rumus: n1 m (ASCII(karakter ke i) * 256i i 0 dengan n = panjang karakter Contoh: bagaimana mengubah pesan “aabc” menjadi sebuah angka m? McGraw-Hill Konversi Huruf ke Angka dalam RSA (2) Contoh: bagaimana mengubah pesan “aabc” menjadi sebuah angka m? n1 m (ASCII(karakter ke i) * 256 i i 0 Jawab: ASCII (‘a’) = 97 ASCII (‘b’) = 98 ASCII (‘c’) = 99 sehingga m = (97 x 2560) + (97 x 2561) + (98 x 2562) + (99 x 2563) = 97 + 24.842 + 6.422.528 + 1.660.944.384 = 1.667.391.841 (angka yang cukup besar) McGraw-Hill Konversi Huruf ke Angka….(3) Namun demikian, sebetulnya cara tersebut bukan satu-satunya, tergantung dari kesepakatan Alice dan Bob. Ada yang menggunakan cara karakter per karakter (Cara kedua) Misal kata ”tugasakhir” akan dikonversi terlebih dahulu menjadi: “tugasakhir” = 116 117 103 97 115 97 107 104 105 114 Misalkan Alice mengambil blok dengan panjang 4 digit menjadi : 1161, 1710, 3971, 1597, 1071, 0410, 5114. Masing-masing angka ini kemudian dihitung menggunakan pasangan kunci publik. • Tentang kunci publik, kunci rahasia, enkripsi, dekripsi, dsb. dibahas setelah ini. McGraw-Hill Konversi Huruf ke Angka….(4) Cara ketiga: Mirip dengan cara pertama, namun dengan bilangan basis yang dipangkatkan 95. Cara keempat, kelima, dan seterusnya bisa dicek di Internet. Intinya, untuk mengubah ke suatu angka tergantung konvensi (kesepakatan) antara Alice dan Bob Untuk mengembalikan dari angka menjadi huruf saat dekripsi, dibutuhkan tabel ASCII (untuk cara kedua) dan kalkulasi komputer yang lebih rumit (untuk cara pertama dan ketiga) McGraw-Hill Ide Utama Enkripsi RSA (Rivest, Shamir, Adleman) 1. Key setup Pilih dua buah bilangan prima p,q Hitung n = p.q Pilih e sedemikian hingga 1<e<ф dengan ф = (p-1)(q-1) Hitung d yang secara relatif prima terhadap ф kunci publik (n,e) kunci privat (d) McGraw-Hill 2. Enkripsi c = me mod n m = pesan asli / plaintext 3. Dekripsi m = cd mod n McGraw-Hill Contoh soal Diketahui pada algoritma RSA bahwa key setup yang dilakukan adalah p=3, q=11 dan e dipilih 17 a. Berapa nilai d yang dipilih ? b. Jika m=5 tentukan cipher teksnya ! c. Buktikan bahwa dekripsi yang dilakukan akan menghasilkan m yang sesuai butir b ! McGraw-Hill Jawab: p = 3; q = 11 n = p.q = (3)(11) = 33 ф = (p-1)(q-1)=(2)(10) = 20 e 1 < e < ф 1 < e < 20 misal e=17 pilih d, 1 < d < ф e.d=1 mod ф Kandidat d e.d e.d mod ф Keterangan 2 34 34 mod 20 = 14 bukan 3 51 51 mod 20 = 11 Bukan 4 68 68 mod 20 = 8 Bukan …. … … … 13 221 221 mod 20 = 1 Dipilih McGraw-Hill Cari cara cerdas untuk mencari d 1. Perkirakan, d genap atau ganjil akan menghemat setengah waktu untuk pencarian 2. Perkirakan kandidat d yang paling mungkin. Contoh: dari kasus sebelumnya e.d mod ф = 1; untuk e = 17 dan ф = 20 dapat ditulis sebagai 17d/20 = sebuah angka (tidak penting berapa nilainya) dengan sisa pembagian 1. Semua kelipatan 20 pasti berakhiran 0 (yaitu: 20, 40, 60, dst.) 17d pasti berakhiran (0 + 1) = 1; dan d pasti berakhiran 3, karena bilangan lain jelas tidak mungkin (ingat 7*3 = 21) Untuk 1<d< 20, maka d yang mungkin adalah 3 dan 13. Bilangan 3 sudah dicari bukan. Berarti jawabannya pasti d = 13. Cek: 17*13 = 221; 221 mod 20 = 1 TERBUKTI. McGraw-Hill kunci publik (n,e)=(33,17) kunci privat (d)=(13) b. Enkripsi c = me mod n dengan m = 5 33 c=14 McGraw-Hill c. Dekripsi m = 5 (terbukti) McGraw-Hill PR (1 minggu) 1. Untuk teks “Hello”, tentukan m (plaintext) yang siap dienkripsi dalam RSA, dengan cara pertama dan kedua (asumsi: ukuran blok 3 digit menjadi 4 digit). Lihat Tabel ASCII. 2. Diketahui pada algoritma RSA bahwa key setup yang dilakukan adalah p=13, q=17, dan e dipilih = 25. a. Berapa nilai d yang dipilih? (d adalah ganjil sedemikian hingga 159 < d < 190) b. Jika m = 7, tentukan ciphertext c-nya. c. Buktikan bahwa dekripsi yang dilakukan akan menghasilkan m sesuai butir b. McGraw-Hill Private Key Cryptosystem Disebut pula sebagai Kriptografi simetrik (symmetric cryptography) atau kriptografi kunci rahasia (secret key cryptography) McGraw-Hill Symmetric Cryptography • Kriptografi simetrik (symmetric cryptography) atau dikenal pula sebagai kriptografi kunci rahasia (secret key cryptography) • Merupakan kriptografi yang menggunakan kunci yang sama baik untuk proses enkripsi maupun dekripsi. • Kriptografi simetrik sangat menekankan pada kerahasiaan kunci yang digunakan untuk proses enkripsi dan dekripsi. Oleh karena itulah kriptografi ini dinamakan pula sebagai kriptografi kunci rahasia • Contoh algoritma simetrik adalah : OTP, DES (Data Encryption Standard), RC2, RC4 (Ron’s Code), Rc5, RC6, IDEA (International Data Encryption Algorithm), Twofish, Magenta, Rijndael (AESAdvanced Encryption Standard), Blowfish, GOST, dan lain – lain • Block cipher : IDEA, AES, DES • Stream cipher : RC4 McGraw-Hill Symmetric Cryptography Kunci untuk enkripsi = kunci untuk dekripsi Ek(m) = c Dk(c) = m McGraw-Hill Mekanisme Kerja Symmetric Cryptography • Alice dan Bob menyetujui algoritma simetrik yang akan digunakan • Alice dan Bob menyetujui kunci yang akan dipakai • Alice membuat pesan plaintext yang akan dikirimkan kepada Bob, lalu melakukan proses enkripsi dengan menggunakan kunci dan algoritma yang telah disepakati sehingga menghasilkan ciphertext • Alice mengirimkan ciphertext tersebut kepada Bob • Bob menerima ciphertext, lalu melakukan dekripsi dengan menggunakan kunci dan algoritma yang sama sehingga dapat memperoleh plaintext tersebut McGraw-Hill Mekanisme Kerja Symmetric Cryptography Sumber Kunci Pihak tak dikenal jalur aman e e Enkripsi E e (m) = c c jalur tak aman Dekripsi D d (c) = m m m Sumber Plaintext Tujuan Alice Bob McGraw-Hill Kelemahan Symmetric Cryptography • Harus ada jalur aman (secure channel) dahulu yang memungkinkan Bob dan Alice melakukan transaksi kunci • Hal ini menjadi masalah karena jika jalur itu memang ada, tentunya kriptografi tidak diperlukan lagi dalam hal ini. Masalah ini dikenal sebagai masalah persebaran kunci (key distribution problem) • Kelemahan lainnya adalah bahwa untuk tiap pasang pelaku sistem informasi diperlukan sebuah kunci yang berbeda. Dengan demikian bila terdapat n pelaku sistem informasi, maka agar tiap pasang dapat melakukan komunikasi diperlukan kunci sejumlah total n(n – 1)/2 kunci. Untuk jumlah n yang sangat besar, penyediaan kunci ini akan menjadi masalah, yang dikenal sebagai masalah manajemen kunci (key management problem) McGraw-Hill Keuntungan Symmetric Cryptography Dibandingkan dengan kriptografi asimetrik, kriptografi simetrik memiliki kecepatan operasi yang jauh lebih cepat. 69 McGraw-Hill Secret Key Cryptosystem • Block Cipher • Transposition Cipher • Substitution Cipher • Stream Cipher • Polyalphabetic substitutions and Vigenere ciphers • Polyalphabetic cipher machines and rotors • Cryptanalysis of classical ciphers 70 McGraw-Hill Transposition ciphers Transposition cipher melakukan proses enkripsi dan dekripsi dengan cara : • Mengganti urutan huruf pada Plaintext (enkripsi) dan Ciphertext (dekripsi) dengan aturan tertentu • Aturan ini membentuk kunci yang di pakai dalam Enkripsi / Dekripsi 71 McGraw-Hill Contoh Transposition Cipher Misalkan Plaintext “gadjah” dan Kunci “pakai blok berukuran tiga, tukar huruf pertama dengan huruf kedua, huruf ketiga dibuat tetap”. Plaintext dibagi beberapa blok dengan ukuran sesuai informasi Kunci, kemudian penukaran Kunci dipakai. Dalam contoh ini Plaintext “gadjah” di enkrip menjadi “agdajh” 72 McGraw-Hill Contoh 1: Transposition Cipher Plaintext : g a d j a h Enkripsi Ciphertext : a g d a j h Dekripsi Plaintext : g a d j a h 73 McGraw-Hill Contoh 2: Matrix encryption Ide : plaintext diletakkan pada matriks bujursangkar. Contoh : UNIVERSITAS DIPONEGORO * spasi pada plaintext diabaikan. Jumlah karakter contoh plaintext di atas adalah 21 karakter, maka matriks yang dipakai adalah 25 = 52. McGraw-Hill Matriksnya menjadi: 1 2 3 4 5 U N I V E R S I T A S D I P O N E G O R O X X X X •Misal : kunci = 41325 (berdasar kolom) •Jadi chipertext = VTPOX URSNO IIIGX NSDEX EAORX dan digabung menjadi : VTPOXURSNOIIIGXNSDEXEAORX McGraw-Hill Dekripsi Matrix Encryption • Dekripsi : – Bagi 1 blok untuk 5 huruf – Buat matriks berdasar kolom (atas ke bawah) – Urutkan dalam posisi 12345 – Baca per baris (UNIVERSITASDIPONEGORO) McGraw-Hill PR C (waktu 1 minggu) Dengan menggunakan metode Matrix Encryption, bagaimanakah ciphertext yang dihasilkan jika plaintext ="HARUS SEMANGAT UNTUK PAHAM KRIPTOGRAFI" dan kunci = 246153 (berdasar kolom). McGraw-Hill Ada Pertanyaan? Terima kasih Sekian McGraw-Hill