Free Essay

Encryption and Decryption (in Indonesia)

In:

Submitted By iTawakkal
Words 466
Pages 2
ENKRIPSI DAN DEKRIPSI
PENGERTIAN ENKRIPSI DAN DEKRIPSI enkripsi adalah membuatsebuah informai tidak bisa di baca tanpa bantuan pengetahuan tertentu/khusus yang dimana bertujuan untuk kebutuhan keamanan. Sedikit sejarah tentang enkripsi, Di pertengahan tahun 1970-an, enkripsi sangat dimanfaatkan untuk pengamanan oleh sekretariat agen pemerintah Amerika Serikat pada domain publik, dan pada zaman sekarang enkripsi digunakan pada byak sistem, seperti ATM pada bank. Untuk pengertian secara teknisnya, enkripsi merupakan proses untuk mengubah plainteks(informasi sebenarnya) menjadi chiperteks(informasi yang tidak sesungguhnya/hasil enkripsi).
Deskripsi adalah kebalikan dari Enkripsi yakni upaya untuk mengartikan chipertext sehingga didapatkan informasi yang sesungguhnya.
KELEBIHAN DAN KEKURANGAN ENKRIPSI
• Kelebihan dari Enkripsi o Kerahasiaan suatu informasi terjamin o Menyediakan autentikasi dan perlindungan integritas pada algoritma checksum/hash. o Menanggulangi penyadapan telepon dan email o Untuk digital signature

• Kekurangan dari Enkripsi o Penyandian rencana teroris o Penyembunyian record kriminal oleh seorang penjahat o Pesan tidak bisa dibaca bila penerima pesan lupa atau kehilangan kunci

TUJUAN ENKRIPSI
1. Kerahasiaan :Yaitu untuk menjaga isi dari informasi. Isi informasi dapat didapatkan jika seorang individu mempunyai kunci rahasisa untuk embuka infomrasi yang terlah di ekripsi tersebut. 2. Integritas data : Untuk menjaga keaslian/keutuhan data.

3. Autentikasi : berhubungan dengan identifikasi/pengenalancontohnya seperti dalam penggunaan kartu ATM. 4. Non-repudiasi/Nirpenyangkalan : Adalah usaha untuk mencegah terjadinya sebuah penyangkalan terhadap pengiriman data.

PENGERTIAN CIPHERS
Cipher adalah algoritma untuk melakukan enkripsi dan dekripsi. Cipher pada biasanya memiliki parameter dari sebagian dari informasi utama, disebut sebagai kunci. cara enkripsi sangatlah bervariasi bergantung pada kunci. Tanpa menggunakan kunci, chiper tidak dapat digunakan untuk dienkirpsi ataupun didekripsi.

TIPE-TIPE CIPHERS
Metode enkripsi dibagi menjadi algoritma symmetric key dan algoritma asymmetric key. algoritma symmetric key (contoh, DES dan AES), pembuat dan target harus mempunyai kunci yang sama untuk digunakan dan dijaga kerahasiaanya. Pengirim menggunakan kunci untuk enkripsi dan penerima meggunakan kunci untuk dekripsi. Cipher symmetric key dibedakan berdasarkan bagaimana cipher tersebut bekerja. menjadi dua tipe, yakni tergantung pada pada blok simbol pada ukuran yang tetap (block ciphers), atau pada aliran simbol terus-menerus (stream ciphers).
Pada algoritma asymmetric key (misalkan, RSA), terdapat dua kunci berbeda, public key disebar dan memperbolehkan siapapun pengirim untuk melakukan enkripsi, lalu ada yang disebut private key dijaga kerahasiannya oleh penerima yang digunakan untuk dekripsi.

MODEL-MODEL ENKRIPSI
• Symmetric Cryptosystem ( Enkripsi Konvensional)
Dalam symmetric cryptosystem, kunci yang digunakan dalam proses enkripsi dan dekripsi adalah sama.

• Assymmetric Cryptosystem (Enkripsi public-key)
Dalam Assymmetric cryptosystem, kunci yang digunakan ada dua. Kunci yang pertama adalah kunci yang bisa di sebar disebut dengan kunci publik (public key), kunci yang satunya harus dirahasiakan atau disebut dengan kunci privat (private key). Logikanya seperti ini: o A mengirimkan pesan kepada B. o A menyandikan pesannya dengan menggunakan kunci publik B. o Bila B ingin membaca pesan dari A, ia harus menggunakan kunci privatnya untuk mendekripsikan pesan yang tersandikan itu.

Similar Documents

Premium Essay

Pert

...Computer science From Wikipedia, the free encyclopedia Jump to: navigation, search Computer science or computing science (abbreviated CS) is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems.[1][2] Computer scientists invent algorithmic processes that create, describe, and transform information and formulate suitable abstractions to model complex systems. Computer science has many sub-fields; some, such as computational complexity theory, study the fundamental properties of computational problems, while others, such as computer graphics, emphasize the computation of specific results. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describe computations, while computer programming applies specific programming languages to solve specific computational problems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to humans. The general public sometimes confuses computer science with careers that deal with computers (such as information technology), or think that it relates to their own experience of computers, which typically involves activities such as gaming, web-browsing, and word-processing. However, the focus of computer science is more on understanding the properties of the programs used to implement...

Words: 5655 - Pages: 23

Premium Essay

Liec

...to perform transaction and communication. Therefore, any consumers around the world can visit our website and make purchases anywhere and anytime. Consumers can choose different brands of apparel in our website Our objective is not only in generate profit but also engage on corporate social responsibility in order to preserve the environment and contribute to the society and the world. We believe consumers are not the only one who are drawn to business that give back. Therefore, we will donate to the national and local charities that can benefit the charities and local communities programs, and we will also treat employees fairly and ethically. Zone5 is growing larger and fast in Southeast Asia which include Singapore, Malaysia, and Indonesia. To expand our business, we are proud to announce our venture further into China. At Zone5,we believe the consumers will experience a fun and easy shopping. Executive summary As an e-retailers that sell products through the Internet. There will be many legal issues we will encounter and it is unavoidable. For an online website, the common legal issue we will encounter is regarding about the domain name, trademark, and copyright issues. Similar occurrence will happen to our website when a person or other parties uses a sign identical or similar to the trademark concerned in relation to products or services without any concern of our trademark or copyright. Besides, there will be legal issues arise for the consumers rights when the consumers...

Words: 6285 - Pages: 26

Premium Essay

Capstone Budget Nt2799

...Dell Optiplex 3020 * TYPETower -------------------------------------------------   * BUNDLED OSWindows (7) -------------------------------------------------   * CPU FAMILYCore i5 -------------------------------------------------   * PROCESSOR SPEED3.2 GHz -------------------------------------------------   * SYSTEM RAM8 GB * HARD DRIVE(S)1 TB (total) Platter -------------------------------------------------   * RELEASEDNovember 15, 2013 ------------------------------------------------- General * TypeTower * Bundled OSWindows (7) ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Processor * Processor makeIntel * CPU familyCore i5 * CPU model4570 * Processor speed3.2 GHz * Number of CPUs1 * Cache size3 MB L3 cache ------------------------------------------------- Video * Graphics adapterIntegrated * Graphics (integrated)Intel ------------------------------------------------- Optical media * Optical drives1 * Disc loading typeTray loading * Readable optical mediaDVD (8x), CD (8x) * Optical write supportYes * Writable optical mediaDVD, CD * Writable DVD formatsDVD-RW, DVD+RW * CD formatsCD-RW ------------------------------------------------- Networking * Ethernet10/100/1000 [Gigabit] * Ethernet ports1 ports ...

Words: 3534 - Pages: 15

Premium Essay

Learning-Guide

...Learning Guide INFS2233 Foundations of Electronic Commerce UQ Business School Faculty of Business, Economics and Law St. Lucia Campus Semester 1, 2009 Any student with a disability who may require alternative academic arrangements in this course is encouraged to seek advice at the commencement of the semester from a disability adviser at Student Support Services. Authors Dr Chris Manning Dr Marta Indulska Dr Dongming Xu Updated by Dr Paul O’Brien Produced by the Teaching and Educational Development Institute, The University of Queensland www.tedi.uq.edu.au Copyright materials contained herein have been reproduced under the provisions of the Copyright Act 1968, as amended, or with the permission of the copyright owner. This material may not be reproduced in any manner whatsoever except for the purposes of individual study. University Provider Number 00025B © The University of Queensland contents Contents Module 1 Introduction to electronic commerce Objectives Basic elements of electronic commerce (EC) 1 1 3 Differences between electronic commerce and traditional commerce 5 New ways of doing business with electronic commerce History of electronic commerce (EC) Planning an e-commerce project Legal, ethical and international issues Case study guidelines 6 8 10 10 11 Module 2 Business decision-making and planning for electronic commerce 17 Objectives Planning an e-commerce project Economic models Competitive advantage and electronic marketplaces...

Words: 38720 - Pages: 155

Premium Essay

Internet and Business

...ECONOMIC AND SOCIAL COMMISSION FOR ASIA AND THE PACIFIC INTERNET USE FOR BUSINESS DEVELOPMENT AN INTRODUCTORY SET OF TRAINING MODULES FOR POLICYMAKERS UNITED NATIONS Bangkok 2007 INTERNET USE FOR BUSINESS DEVELOPMENT AN INTRODUCTORY SET OF TRAINING MODULES FOR POLICYMAKERS United Nations publication Copyright © United Nations 2007 All rights reserved Manufactured in Thailand The designations employed and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The views expressed do not necessarily represent the decisions or the stated policy of the United Nations. Mention of firm names and commercial products does not imply the endorsement of the United Nations. This publication has been issued without formal editing. ii PREFACE The role of small and medium-sized enterprises (SMEs) in national competitiveness and development, as well as in generating jobs and revenues for countless citizens, is well documented. Their meaningful and useful access to Information and Communications Technologies (ICT), particularly the Internet, will significantly enhance this critical role and will drive demand for and innovation in the ICT sector even more. This set of training modules was therefore developed to serve...

Words: 27227 - Pages: 109

Free Essay

Notebook Manual

...Notebook PC User Manual April 2011 E6591 Notebook PC User Manual Table of Contents Chapter 1: Introducing the Notebook PC About This User’s Manual.................................................................................6 Notes for This Manual........................................................................................6 Safety Precautions..............................................................................................7 Preparing your Notebook PC........................................................................11 Chapter 2: Knowing the parts Top Side (on selected models).....................................................................14 Bottom Side (on selected models)..............................................................18 Right Side (on selected models)..................................................................21 Left Side .............................................................................................................24 Rear Side (on selected models)..................................................................26 Front Side (on selected models)...............................................................27 Chapter 3: Getting Started Power System.....................................................................................................30 Using AC Power................................................................................................30 Using Battery Power........

Words: 16260 - Pages: 66

Free Essay

Networks

...The Wealth of Networks The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London Copyright _ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10 9 8 7 6 5 4 3 2 1...

Words: 214717 - Pages: 859

Premium Essay

Management Information Systems

...Course Technology’s Management Information Systems Instructor and Student Resources Introduction to IS/MIS Principles of Information Systems, Eighth Edition • Stair, Reynolds Fundamentals of Information Systems, Fourth Edition • Stair, Reynolds Management Information Systems, Sixth Edition • Oz Information Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and...

Words: 223685 - Pages: 895

Free Essay

Gd-Pi

...Hundreds(of(real(personal(accounts(of Group'Discussions'&'Personal'Interviews during(MBA(admissions(to(India’s(best(B9schools Written'by Compiled'by Loads'of'MBA'Aspirants The'PaGaLGuY'MadCapz'Group PaGaLGuY.com Antholo gy Hundreds of real personal accounts of Group Discussions and Personal Interviews during MBA admissions to India’s best business schools. In this edition: The IIMs at Ahmedabad, Bangalore, Calcutta, Lucknow, Indore & Kozhikode. Written by Loads of MBA aspirants Compiled by The PaGaLGuY MadCapz Team PaGaLGuY GD-PI Anthology Copyright © 2011, PaGaLGuY.com All text and content in this document is solely owned by PaGaLGuY.com. Reproduction without permission in any form or means is illegal. Special copy prepared exclusively for mustafa rokerya Get your own Free personalized copy (with your name on it) of this book from http://www.pagalguy.com/books/ What this book is about What is a real IIM interview like? What kind of questions do they ask and what judgments do applicants have to make while answering them? Since 2003, those with real Group Discussion and Personal Interview calls from India’s top bschools have been posting entire and detailed transcripts of their admission interviews immediately after they happen, so that others slotted for later interviews can learn what GDPI is going to be like this year. This book is a collection of dozens of handpicked GDPI experiences from the country’s top bschools during the admission...

Words: 178933 - Pages: 716

Free Essay

Test2

...62118 0/nm 1/n1 2/nm 3/nm 4/nm 5/nm 6/nm 7/nm 8/nm 9/nm 1990s 0th/pt 1st/p 1th/tc 2nd/p 2th/tc 3rd/p 3th/tc 4th/pt 5th/pt 6th/pt 7th/pt 8th/pt 9th/pt 0s/pt a A AA AAA Aachen/M aardvark/SM Aaren/M Aarhus/M Aarika/M Aaron/M AB aback abacus/SM abaft Abagael/M Abagail/M abalone/SM abandoner/M abandon/LGDRS abandonment/SM abase/LGDSR abasement/S abaser/M abashed/UY abashment/MS abash/SDLG abate/DSRLG abated/U abatement/MS abater/M abattoir/SM Abba/M Abbe/M abbé/S abbess/SM Abbey/M abbey/MS Abbie/M Abbi/M Abbot/M abbot/MS Abbott/M abbr abbrev abbreviated/UA abbreviates/A abbreviate/XDSNG abbreviating/A abbreviation/M Abbye/M Abby/M ABC/M Abdel/M abdicate/NGDSX abdication/M abdomen/SM abdominal/YS abduct/DGS abduction/SM abductor/SM Abdul/M ab/DY abeam Abelard/M Abel/M Abelson/M Abe/M Aberdeen/M Abernathy/M aberrant/YS aberrational aberration/SM abet/S abetted abetting abettor/SM Abeu/M abeyance/MS abeyant Abey/M abhorred abhorrence/MS abhorrent/Y abhorrer/M abhorring abhor/S abidance/MS abide/JGSR abider/M abiding/Y Abidjan/M Abie/M Abigael/M Abigail/M Abigale/M Abilene/M ability/IMES abjection/MS abjectness/SM abject/SGPDY abjuration/SM abjuratory abjurer/M abjure/ZGSRD ablate/VGNSDX ablation/M ablative/SY ablaze abler/E ables/E ablest able/U abloom ablution/MS Ab/M ABM/S abnegate/NGSDX abnegation/M Abner/M abnormality/SM abnormal/SY aboard ...

Words: 113589 - Pages: 455