• Tidak ada hasil yang ditemukan

chapter 8 Nonot Harsono,MT

N/A
N/A
Protected

Academic year: 2018

Membagikan "chapter 8 Nonot Harsono,MT"

Copied!
68
0
0

Teks penuh

(1)

Network Security

(2)

Cryptography

Introduction to Cryptography

Substitution Ciphers

Transposition Ciphers

One-Time Pads

(3)

Need for Security

(4)

An Introduction to Cryptography

(5)

Transposition Ciphers

(6)

One-Time Pads

The use of a one-time pad for encryption and the possibility of getting any possible plaintext from

(7)
(8)

Symmetric-Key Algorithms

DES – The Data Encryption Standard

AES – The Advanced Encryption Standard

Cipher Modes

(9)

Product Ciphers

(10)

Data Encryption Standard

(11)

Triple DES

(12)

AES – The Advanced Encryption Standard

Rules for AES proposals

1.

The algorithm must be a symmetric block cipher.

2.

The full design must be public.

3.

Key lengths of 128, 192, and 256 bits supported.

4.

Both software and hardware implementations required

(13)

AES (2)

(14)

AES (3)

(15)

Electronic Code Book Mode

(16)

Cipher Block Chaining Mode

(17)

Cipher Feedback Mode

(18)

Stream Cipher Mode

(19)

Counter Mode

(20)

Cryptanalysis

(21)

Public-Key Algorithms

RSA

(22)

RSA

(23)

Digital Signatures

Symmetric-Key Signatures

Public-Key Signatures

Message Digests

(24)

Symmetric-Key Signatures

(25)

Public-Key Signatures

(26)

Message Digests

(27)

SHA-1

(28)

SHA-1 (2)

(29)

Management of Public Keys

Certificates

X.509

(30)

Problems with Public-Key Encryption

(31)

Certificates

(32)

X.509

(33)

Public-Key Infrastructures

(34)

Communication Security

IPsec

Firewalls

(35)

IPsec

(36)

IPsec (2)

(37)

Firewalls

(38)

Virtual Private Networks

(39)

802.11 Security

(40)

Authentication Protocols

Authentication Based on a Shared Secret Key

Establishing a Shared Key: Diffie-Hellman

Authentication Using a Key Distribution Center

Authentication Using Kerberos

(41)
(42)

Authentication Based on a Shared Secret Key (2)

(43)

Authentication Based on a Shared Secret Key (3)

(44)

Authentication Based on a Shared Secret Key (4)

(45)

Authentication Based on a Shared Secret Key (5)

(46)

Establishing a Shared Key:

The Diffie-Hellman Key Exchange

(47)

Establishing a Shared Key:

The Diffie-Hellman Key Exchange

(48)

Authentication Using a Key Distribution Center

(49)

Authentication Using a Key Distribution Center (2)

(50)

Authentication Using a Key Distribution Center (3)

(51)

Authentication Using Kerberos

(52)

Authentication Using Public-Key Cryptography

(53)

E-Mail Security

PGP – Pretty Good Privacy

(54)

PGP – Pretty Good Privacy

(55)

PGP – Pretty Good Privacy (2)

(56)

Web Security

Threats

Secure Naming

(57)

Secure Naming

(58)

Secure Naming (2)

(59)

Secure DNS

An example RRSet for bob.com. The KEY record is Bob's

(60)

Self-Certifying Names

(61)

SSL—The Secure Sockets Layer

(62)

SSL (2)

(63)
(64)

Java Applet Security

(65)

Social Issues

Privacy

(66)

Anonymous Remailers

(67)

Freedom of Speech

Possibly banned material:

1.

Material inappropriate for children or teenagers.

2.

Hate aimed at various ethnic, religious, sexual, or other

groups.

3.

Information about democracy and democratic values.

4.

Accounts of historical events contradicting the

government's version.

(68)

Steganography

Referensi

Dokumen terkait

Judul : Strategi Peningkatan dan Pengembangan Penyediaan Preparat Mikrobiologi dalam Rangka Perbaikan Pembelajaran Mikrobiologi LPTK. Program : Tahun : 2000 Status :

IMPLEMENTASI DAN ANALISIS PERFORMANSI GLBP ( GATEWAY LOAD BALANCING PROTOCOL ) PADA JARINGAN VLAN UNTUK LAYANAN VOIP.. Implementation and Performance Analysis of GLBP ( Gateway

Gedung H, Kampus Sekaran-Gunungpati, Semarang 50229 Telepon: (024)

Dayang A : Raja Bandung Bondowoso pun menyetujui persayaratan Ratu, dan kemudian Raja memutuskan untuk membuka tender proyek 100 candi tersebut, dan dari hasil open

Pada penelitian ini wajah dapat dikenali melalui kamera sebanyak 4 orang yang dikenali dari sejumlah keseluruhan sebanyak 5 orang dengan ketentuan penchayaan dan

Berdasarkan hasil penelitian dan pembahasan yang telah dilakukan, maka dapat disimpulkan bahwa gaya kepemimpinan dan ketidakapastian lingkungan memiliki pengaruh terhadap

Penelitian yang dilakukan Daniel Hendra Purwoko (2012) dengan judul, “ Pengaruh Penggunaan Metode Mind Mapping Terhadap Hasil Belajar IPA Siswa Sekolah Dasar Ditinjau dari

Gambar 4.5 Grafik Deskripsi Komparansi Hasil Pengukuran Skor Posttest Kelompok Eksperimen Mind Mapping dan Kelompok Eksperimen Concept Sentence ....