Firdaus, Caesar (2016) SISTEM MONITORING KONTRAK KERJASAMA DENGAN PROTOKOL TWO CENTRAL FACILITIES MENGGUNAKAN ALGORITMA AES DAN WHITESPACE MANIPULATION. S1 thesis, Universitas Pendidikan Indonesia.
|
Text
S_KOM_1100958_Title.pdf Download (95kB) | Preview |
|
|
Text
S_KOM_1100958_Abstract.pdf Download (124kB) | Preview |
|
|
Text
S_KOM_1100958_Table_of_content.pdf Download (323kB) | Preview |
|
|
Text
S_KOM_1100958_Chapter1.pdf Download (241kB) | Preview |
|
Text
S_KOM_1100958_Chapter2.pdf Restricted to Staf Perpustakaan Download (698kB) |
||
|
Text
S_KOM_1100958_Chapter3.pdf Download (160kB) | Preview |
|
Text
S_KOM_1100958_Chapter4.pdf Restricted to Staf Perpustakaan Download (1MB) |
||
|
Text
S_KOM_1100958_Chapter5.pdf Download (153kB) | Preview |
|
|
Text
S_KOM_1100958_Bibilography.pdf Download (61kB) | Preview |
Abstract
Data dan informasi pada pihak pemerintah diharuskan terjaga keamanannya guna melindung data dan informasi serta stakeholder yang terkait pada sistem tersebut. Aspek keamanan dapat dibangun dengan menyertakan algoritma kriptografi, menerapkan konsep information hiding, ataupun melalui penerapan protokol keamanan. Pada penelitian ini protokol two central facilities diterpakan pada Sistem Monitoring Kontrak Kerjasama PUSLITBANG Teknologi Mineral dan Batubara dengan turut menyertakan algoritma AES dan whitespace manipulation. Penyesuaian terhadap protokol tersebut dengan memperhatikan proses pembangkitan dan pengecekan validation ID dapat memenuhi dua dari empat tujuan utama kriptografi, yaitu aspek otentikasi serta nir-penyangkalan. Penerapan protokol two central facilities memerlukan keterlibatan antara 3 komponennya, yaitu central legitimization agency (CLA), central tabulating facility (CTF), dan client. Penggunaan algortima AES dapat menjaga keamanan data dalam proses transmisi dari bentuk serangan man in the middle, sedangkan algoritma whitespace manipulation dapat digunakan untuk menjaga integritas data yang diunggah ke sistem serta digunakan untuk melakukan verifikasi berkas lampiran. Penggunaan kedua algoritma tersebut memenuhi tiga dari empat tujuan kriptografi yaitu aspek kerahasiaan, integritas data, dan otentikasi.; The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and also implementing security protocol. In this particular research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, namely authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA), central tabulating facility (CTF), and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. In the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.
Item Type: | Thesis (S1) |
---|---|
Additional Information: | No. Panggil: S KOM FIR s-2016; Pembimbing: I. wahyudin, II. Eddy Prasetyo |
Uncontrolled Keywords: | Protokol, Two Central Facilities, AES, Whitespace Manipulation, Kriptografi, Protocol, Two Central Facilities, AES, Whitespace Manipulation, Cryptography |
Subjects: | Q Science > Q Science (General) Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Fakultas Pendidikan Matematika dan Ilmu Pengetahuan Alam > Program Studi Ilmu Komputer |
Depositing User: | Mr mhsinf 2017 |
Date Deposited: | 31 Jul 2017 09:04 |
Last Modified: | 31 Jul 2017 09:04 |
URI: | http://repository.upi.edu/id/eprint/24330 |
Actions (login required)
View Item |