Bahan Kuliah IF5054 Kriptografi

Slides:



Advertisements
Presentasi serupa
BAPPEDA KABUPATEN ENDE BIDANG EKONOMI
Advertisements

DIAGNOSING ORGANISASI PUBLIK
ISLAM DAN ILMU PENGETAHUAN
The steps to work with Power Point click Start> All Programs> Microsoft Office> Microsoft Office PowerPoint2007 klik Start>All Programs>Microsoft.
1 Pertemuan 09 Kebutuhan Sistem Matakuliah: T0234 / Sistem Informasi Geografis Tahun: 2005 Versi: 01/revisi 1.
1 Pertemuan 12 Pengkodean & Implementasi Matakuliah: T0234 / Sistem Informasi Geografis Tahun: 2005 Versi: 01/revisi 1.
Bersediakah Anda membantu menjangkau Indonesia dengan Injil? (Will you help reach Indonesia with the Gospel?) A ministry of Campus Crusade for Christ Australia.
1 Pertemuan 21 Function Matakuliah: M0086/Analisis dan Perancangan Sistem Informasi Tahun: 2005 Versi: 5.
Data Encryption Standard (DES)
INDONESIA INFRASTRUCTURE INITIATIVE IURSP – Monitoring dan Evaluasi IURSP – Monitoring and Evaluation Workshop 3 Steve Brown VicRoads International Projects.
1 Pertemuan 2 Unit 1 - Careers Matakuliah: G0682 / Bahasa Inggris Ekonomi 1 Tahun: 2005 Versi: versi/revisi.
1 Pertemuan 11 Function dari System Matakuliah: M0446/Analisa dan Perancangan Sistem Informasi Tahun: 2005 Versi: 0/0.
3 Ways to Record PowerPoint From within PowerPoint From within Camtasia Studio.
Visual Basic for Aplications in powerpoint. What is Visual Basic for Aplications? Visual Basic for Applications (VBA) is a very powerful objectoriented.
I. TINJAUAN INFORMASI AKUNTANSI
DES (Data Encryption Standard)
Data Encryption Standard (DES)
Pert. 16. Menyimak lingkungan IS/IT saat ini
ISLAM DAN ILMU PENGETAHUAN
DEA (Data Encryption Algorithm)
GARIS DAN SUDUT Kompetensi Dasar
DEA (Data Encryption Algorithm)
Data Encryption Standard (DES)
This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during.
ASRIYANI DEWI ( ) MELIA ELMI LAVIANTY ( )
Copyright by Dhoni Yusra
CA113 Pengantar Manajemen Bisnis
PEMBENTUKAN/TERJADINYA PIUTANG NEGARA
Software Engineering Rekayasa Perangkat Lunak
Algoritma Kriptografi Modern
Kelas VII semester 2 Rahmi Susiswanti
CA113 Pengantar Manajemen Bisnis
Manajemen Proyek Perangkat Lunak (MPPL)
Copyright by Dhoni Yusra
TEOREMA PYTHAGORAS This template can be used as a starter file to give updates for project milestones. Sections Right-click on a slide to add sections.
MANAJEMEN SDM PT. AWATARA KARYA
Copyright by Dhoni Yusra
PROSPEK DAN TANTANGAN TEKNOLOGI PEMBELAJARAN
Printing: Your printer might not print the same way our printers do, so make sure to try a couple of test prints. If things aren’t aligning quite right,
Contoh Algoritma Kriptografi Modern
ISLAM DAN ILMU PENGETAHUAN
How to Set Up AT&T on MS Outlook ATT is a multinational company headquartered in Texas. ATT services are used by many people widely across.
How You Can Make Your Fleet Insurance London Claims Letter.
How Can I Be A Driver of The Month as I Am Working for Uber?
How the Challenges Make You A Perfect Event Organiser.
Things You Need to Know Before Running on the Beach.
How to Pitch an Event
Don’t Forget to Avail the Timely Offers with Uber
Takes Rides for Never Ending Fun pacehire.co.uk. It’s still Time to Make Fun Before the Holidays pacehire.co.uk.
© Mark E. Damon - All Rights Reserved Another Presentation © All rights Reserved
Evidence-Based Medicine Prof. Carl Heneghan Director CEBM University of Oxford.
CA113 Pengantar Manajemen Bisnis
Algoritma Kriptografi Modern
THE INFORMATION ABOUT HEALTH INSURANCE IN AUSTRALIA.
MAKING A CONCLUSION AND RECOMMENDATION
V ERIZON SETTINGS FOR I P HONE, A NDROID, O UTLOOK, AND W INDOWS P HONE.
HughesNet was founded in 1971 and it is headquartered in Germantown, Maryland. It is a provider of satellite-based communications services. Hughesnet.
Do you want to check your Zoho mail incoming or outgoing logs and unable to check, go through with this article and access Zoho mail incoming or outgoing.
 Zoho Mail offers easy options to migrate data from G Suite or Gmail accounts. All s, contacts, and calendar or other important data can be imported.
Zoho mail is an integrated Docs Online Document Management System. Zoho mail provides user to receive and send mails in such an easy way. Are you facing.
Fix problems opening Norton  Fix problems opening Norton This problem can happen after you update Norton. To fix the matter, restart the computer. Fix.
If you are an user, then you know how spam affects your account. In this article, we tell you how you can control spam’s in your ZOHO.
ISA Implementation Support Module Prepared by IAASB Staff October 2010 Materiality, Misstatements and Reporting − Part II.
Integrasi e-Office dan Saga
Rank Your Ideas The next step is to rank and compare your three high- potential ideas. Rank each one on the three qualities of feasibility, persuasion,
Draw a picture that shows where the knife, fork, spoon, and napkin are placed in a table setting.
2. Discussion TASK 1. WORK IN PAIRS Ask your partner. Then, in turn your friend asks you A. what kinds of product are there? B. why do people want to.
HOW TO IMPROVE YOUR PUBLIC SPEAKING SKILLS. 2 3 INIKAH YANG SERING ANDA ALAMI SAAT PRESENTASI?
3 Ways to Record PowerPoint From within PowerPoint From within Camtasia Studio.
Transcript presentasi:

Bahan Kuliah IF5054 Kriptografi This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered. GOST Bahan Kuliah IF5054 Kriptografi

GOST = Gosudarstvenny Standard, artinya standard pemerintah, adalah algoritma enkripsi dari negara Uni Soviet dahulu Dikembangkan pada tahun 1970. Dibuat oleh Soviet sebagai alternatif terhadap algoritma enkripsi standard Amerika Serikat, DES. GOST secara struktural mirip dengan DES

Ukuran blok pesan = 64 bit Panjang kunci = 256 bit Jumlah putaran = 32 putaran Setiap putaran menggunakan kunci internal. Kunci internal sebenarnya hanya ada 8 buah, K1 sampai K8, Karena ada 32 putaran, maka 8 buah kunci internal ini dijadwalkan penggunaannya.

Pembangkitan kunci internal sangat sederhana. Kunci eksternal yang panjangnya 256 bit dibagi ke dalam delapan bagian yang masing-masing panjangnya 32 bit. Delapan bagian ini yang dinamakan K1, K2, …, K8.

GOST menggunakan Jaringan Feistel Satu putaran GOST: Li = Ri – 1 Ri = Li – 1  f(Ri – 1, Ki) Fungsi f terdiri dari - penjumlahan modulo 232 - substitusi - pergeserran

Hasil penjumlahan Ri – 1 dengan kunci internal ke-i menghasilkan luaran yang panjangnya 32 bit. Luaran ini dibagi mejadi 8 bagian yang masing-masing panjangnya 4 bit. Setiap 4 bit masuk ke dalam kotak S untuk proses substitusi. Empat bit pertama masuk ke dalam kotak S pertama, 4 bit kedua masuk ke dalam kotak S kedua, demikian seterusnya. Hasil substitusi setiap kotak S adalah 4 bit. GOST memiliki 8 buah kotak S, setiap kotak berisi 16 buah elemen nilai. Setiap kotak berisi permutasi angka 0 sampai 15.

Misalnya pada kotak S pertama, masukannya: 0000 (nilai desimal 0) maka luarannya: nilai di dalam elemen ke-0:   4 atau 0100 Hasil substitusi dari semua kotak S ini digabung menjadi pesan 32-bit, kemudian pesan 32-bit ini digeser ke kiri sejauh 11 bit secara sirkuler. Hasilnya kemudian di-XOR-kan dengan Li – 1 untuk kemudian memberikan bagian cipherteks kanan yang baru, Ri. Proses ini diulang sebanyak 32 kali.

Perbedaan GOST dengan DES: Kunci DES 56 bit, sedangkan kunci GOST lebih panjang yaitu 256 bit. Ini menyebabkan exhaustive key search terhadap GOST lebih sukar dibandingkan dengan DES. Jumlah putaran DES 16 kali, sedangkan GOST lebih banyak yaitu 32 kali sehingga membuat kriptanalisis menjadi sangat sulit Kotak S di dalam DES menerima masukan 6 bit dan luaran 4 bit (berukuran 6  4), sedangkan kotak S di dalam GOST menerima masukan 4 bit dan luaran 4 bit (berukuran 4  4) Pembangkitan kunci internal DES rumit, sedangkan di dalam GOST pembangkitan kunci internalnya sederhana DES mempunyai permutasi yang tidak teratur, sedangkan GOST hanya menggunakan pergeseran 11-bit secara sirkuler

GOST adalah cipher yang sangat aman GOST adalah cipher yang sangat aman. Hal ini mungkin disebabkan jumlah putaran dan panjang kunci yang lebih banyak dari DES. Belum ada publikasi kriptanalisis tentang GOST [WIK06].

Status Summary Is project on track for delivery as expected? What is final date for delivery? What are final cost estimates? Status against any other high-level shipping goals Manufacturing rate Delivery Partners, etc.

Progress List achievements and progress since last status update was given Address schedule implications Highlight those things that made progress possible

Attention Areas List delays and problems since last status update was given List corrective actions being taken Address schedule implications Make sure you understand Issues that are causing delays or impeding progress Why problem was not anticipated If customer will want to discuss issue with upper management

Schedule List top high-level dates Keep simple so audience does not get distracted with details Distribute more detailed schedule if appropriate Make sure you are familiar with details of schedule so you can answer questions

Deliveries List main critical deliverables Yours to client Yours to outside services Outside services to you Other departments to you Understand your confidence rating to each deliverable Indicate confidence level on slides if appropriate

Costs List new projections of costs If there are cost overruns Include original estimates Understand source of differences in these numbers -- be ready for questions If there are cost overruns summarize why list corrective or preventative action you’ve taken set realistic expectations for future expenditures

Technology List technical problems that have been solved List outstanding technical issues that need to be solved Summarize their impact on the project List any dubious technological dependencies for project Indicate source of doubt Summarize action being taken or backup plan

Resources Summarize project resources Dedicated (full-time) resources Part-time resources If project is constrained by lack of resources, suggest alternatives Understand that customers may want to be assured that all possible resources are being used, but in such a way that costs will be properly managed

Goals for Next Review Date of next status update List goals for next review Specific items that will be done Issues that will be resolved Make sure anyone involved in project understands action plan