1 / 12

Pengamanan Informasi

Pengamanan Informasi. Aspek Keamanan. Confidentiality (Kerahasiaan) Integrity (Integritas) Availability (Ketersediaan). Evolusi Pengamanan Data. Steganography Menyamarkan data sehingga seolah-olah tidak ada Cryptography Mengacak data; Mengubah susunan huruf ( transposition )

mirra
Download Presentation

Pengamanan Informasi

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Pengamanan Informasi

  2. Aspek Keamanan • Confidentiality (Kerahasiaan) • Integrity (Integritas) • Availability (Ketersediaan)

  3. Evolusi Pengamanan Data • Steganography • Menyamarkan data sehingga seolah-olah tidak ada • Cryptography • Mengacak data; • Mengubah susunan huruf (transposition) • Menggantikan huruf dengan huruf atau kode lainnya (substitution)

  4. Steganography • Yunani vs Persia • Pesan disembunyikan di meja yang dilapisi lilin • Histalaeus • Pesan ditato di kepala budak yang telah digunduli • Digital watermarking • Menandai kepemilikan gambar digital dengan menyisipkan pesan dalam bit terendah (LSB)

  5. http://www.randomhouse.com/doubleday/davinci/

  6. Masih Steganography … • Isi sebuah iklanSetelah engkau rasakan nikmatnya gula, hisap aroma rokok ini sampai engkau nyaman ingin nambah.(Tugas dari Nur Alimah) • Apa pesan sebenarnya?

  7. Cryptography http://www.unmuseum.org/excoded.htm • Contoh transposition • Rail fence • Simple transposition:pesan ditulis mendatardikirimkan vertikal • Spartan Scytale (5 BC) asimplekin doftranspo sitionciph erwritesth emessagein toarectang lebyrowsan dreadsitou tbycolumns http://en.wikibooks.org/wiki/Cryptography:Transposition_ciphers http://www.ccisource.com/content/resources/articles/Jan01/symmetric.htm

  8. Cryptography • Contoh substitution • Caesar cipher (geser 3 huruf) • A B C D E F G H I J K L M N O P Q R S T U V W X Y Z • d e f g h i j k l m n o p q r s t u v w x y z a b cBUDI = exgl • Tabel dapat digeser n huruf ke kiri atau ke kanan. n dan arah menjadi kunci • Enigma (rotor) • Digunakan Jerman padaperang dunia ke 2

  9. Komponen Cryptography • Plain text • Sumber berita/pesan/teks asli • Cipher text • Teks yang sudah diproses (diacak, digantikan) • Algoritma & kunci • Misal: subsitusi (algoritma) & number of shift (kunci) • Pemisahan alg & kunci ditemukan oleh Auguste Kerckhoffs von Niewenhof (1883)

  10. Encryption Private-key Cryptosystem Alice Bob Shared (secret) key Decryption Plaintext Plaintext Ciphertext My phone555-1234 My phone555-1234 Y$85QeNx0@0xfga Eve

  11. Encryption Public-key Cryptosystem Public key Public key repositoryCertificate Authority (CA) Private key Decryption Plaintext Plaintext Ciphertext L)8*@Hg%19kXSph My phone555-1234 My phone555-1234

  12. Penutup • Masih kurang SDM Indonesia yang menguasai teknis pengamanan data • Bergantung kepada negara lain!Sangat berbahaya

More Related