Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 141436 dokumen yang sesuai dengan query
cover
Laurentinus Rian
"ABSTRAK
Skripsi ini membahas tentang aplikasi Instant Messenger pada smartphone berbasis Android. Aplikasi ini memanfaatkan asymmetric encryption dalam pengamanan pesan. Asymmetric encryption dipilih agar dapat memberikan pengamanan yang baik kepada pengguna aplikasi sehingga pesan yang dikirimkan hanya dapat dibaca oleh pengirim dan penerima. Aplikasi ini menggunakan protokol XMPP yang merupakan salah satu protokol dalam instant messenger yang bersifat open source. Analisa keamanan pesan dilakukan terhadap variasi algoritma enkripsi dan panjang kunci yang digunakan yang mempengaruhi waktu yang diperlukan untuk melakukan proses enkripsi tersebut dan panjang data hasil enkripsi. Variasi-variasi ini dianalisasi untuk menentukan algoritma enkripsi dan panjang kunci yang optimal untuk digunakan pada aplikasi instant messenger pada smartphone berbasis Android dengan memperhatikan batas kemampuan smartphone tersebut. Dari hasil penelitian ini didapatkan bahwa algoritma enkripsi ECIES memiliki performa yang paling baik untuk diterapkan pada aplikasi instant messenger. Pada proses pembuatan kunci memiliki persentase peningkatan sebesar 99.89% dibandingkan RSA dan 93,63% dibandingkan Diffie-Hellman. Pada proses enkripsi algoritma ini tidak sebaik RSA namun pada proses dekripsi memiliki peningkatan sebesar 85, 36 % dibandingkan RSA dan 98,35% dibandingkan Diffie-Hellman

ABSTRACT
This paper discussing about Instant Messenger application for Android. This application uses asymmetric encryption for message protection. Asymmetric encryption is used because it will give good protection for application user so that only message sender and receiver who can read the message. This application uses XMPP protocol. XMPP is an open source instant messenger protocol. Message protection is analyzed using encryption algorithms and key lengths variation. An algorithm and a key length will be chosen as the most suitable to use in Android smartphone. In the end, this research shows that ECIES encryption is the best algorithm to be used in instant messenger application. ECIES has 99.89% increment than RSA and 93.63% increment than Diffie-Hellman in creating keys process. Although ECIES does not have increment in encryption process than RSA but it has 85.36% increment than RSA and 98.35% increment than Diffie-Hellman in decryption process."
Fakultas Teknik Universitas Indonesia, 2014
S54053
UI - Skripsi Membership  Universitas Indonesia Library
cover
Muhammad Diffa Ananda Lukman
"Keamanan, kerahasiaan, dan integritas informasi atau data menjadi aspek-aspek penting dalam komunikasi digital saat ini. Alasannya adalah untuk mencegah data untuk dapat diakses oleh pihak ketiga dan menjaga konsistensi data selama proses transmisi antara dua titik komunikasi. Hal tersebut dapat dicapai dengan menerapkan autentikasi, enkripsi, dan signature terhadap suatu data pada skema kriptografi asimetris. Penelitian ini membahas mengenai rancang bangun aplikasi web yang mengimplementasikan skema kriptografi asimetris pada proses enkripsi dan dekripsi teks sebagai data. Algoritma kriptografi yang tersedia pada aplikasi ini adalah RSA (Rivest-Shamir-Adleman) dan ECC (Elliptic Curve Cryptography). Aplikasi web ini akan memiliki fitur-fitur, seperti membentuk kunci public dan private, enkripsi data teks, memberi signature terhadap data teks, dekripsi data teks, dan verifikasi signature data teks. Dari implementasi aplikasi web tersebut, akan dilakukan analisis perbandingan performa antara algoritma kriptografi RSA dan ECC dari sisi konsumsi waktu dalam melakukan proses pembentukan kunci, enkripsi, dekripsi, tanda tangan, dan verifikasi terhadap data di setiap ukuran kunci berdasarkan beberapa tingkat keamanan kriptografi.

Security, confidentiality and integrity of information or data are important aspects of today's digital communications. The reason is to prevent data from being accessed by third parties and to maintain data consistency during the transmission process between two communication points. This can be achieved by applying authentication, encryption, and signature to data in an asymmetric cryptography scheme. This study discusses the design and development of web applications that implement an asymmetric cryptography scheme in the process of encrypting and decrypting text as data. The cryptography algorithms available in this application are RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). This web application will have features, such as forming public and private keys, encrypting text data, giving signatures to text data, decrypting text data, and verifying text data signatures. From the implementation of the web application, a performance comparison analysis will be carried out between the RSA and ECC cryptography algorithms in terms of time consumption in keys generation, encrypting, decrypting, signing, and verifying data at each key size based on several levels of cryptographic security measure."
Depok: Fakultas Teknik Universitas Indonesia, 2023
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Dwi Agy Jatmiko
"Kriptografi kunci publik merupakan salah satu teknik kriptografi untuk mengamankan transmisi informasi. Pertukaran kunci Diffie-Hellman dan sistem kriptografi ElGamal merupakan dua teknik kriptografi kunci publik yang didasarkan pada Discrete Logarithm Problem (DLP). Pesatnya perkembangan komputer belakangan ini menuntut penggunaan keysize yang relatif besar untuk menjaga tingkat keamanan transmisi informasi melalui pertukaran kunci Diffie-Hellman dan sistem kriptografi ElGamal. Di dalam tugas akhir ini, akan dijelaskan mengenai penerapan kurva eliptis pada pertukaran kunci Diffie-Hellman dan sistem kriptografi ElGamal. Diharapkan penerapan kurva eliptis dapat memberikan tingkat keamanan transmisi informasi yang tinggi namun dengan penggunaan keysize yang relatif lebih kecil.

Public key cryptography is one of cryptographic techniques for securing information transmission. Diffie-Hellman key exchange dan ElGamal Cryptosystem are public key cryptography techniques that based on Discrete Logarithm Problem (DLP). Recent rapid-growing of computer made information transmission using Diffie-Hellman key exchange dan ElGamal cryptosystem have to use a relative large keysize to keep its security level. This skripsi will explain about elliptic curve implementation in Diffie-Hellman key exchange dan ElGamal Cryptosystem. Elliptic curve implementation expected to give higher security level in information transmission althought using relative small keysize."
Depok: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Indonesia, 2012
S53056
UI - Skripsi Membership  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption, special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes."
Heidelberg: Springer, 2012
e20410303
eBooks  Universitas Indonesia Library
cover
Muh. Rifki Eka Putra
"Skripsi"ini"membahas"mengenai"pengujian"sistem"M-Herbal"yang"berbasis teknologi smartphone. Aplikasi kesehatan M-Herbal dibangun pada environment Android menggunakan bahasa pemrograman Java dan XML. Aplikasi M-Herbal terhubung pada server yang dibangun pada operating system non-server yang menggunakan engine server XAMPP yang berbasis MySQL. Database tanaman menggunakan database yang telah dibuat oleh Fakultas Farmasi Universitas Indonesia.
Dari hasil pengujian, diperoleh nilai Mean Opinion Square yaitu 3,82 yang berarti aplikasi diterima oleh user. Waktu yang dibutuhkan untuk mengakses fitur yang ada pada aplikasi m-herbal adalah 0,000317697 ms.

This thesis deals with the testing system M-Herbal-based smartphone technology. M-Health Herbal applications built on Android environment using the Java programming language and XML. Application of M-Herbal connected on a server that is built on a non-server operating system that uses XAMPP server engine MySQL based. Plant Database using a database that has been created by the Faculty of pharmacy of the University of Indonesia.
From the test results, obtained a value of 3.82 Square Mean Opinion which means the application is received by the user. The time it takes to access the features of the application m-herbs is 0,000317697 ms.
"
Depok: Fakultas Teknik Universitas Indonesia, 2013
S47335
UI - Skripsi Membership  Universitas Indonesia Library
cover
Fakultas Ilmu Komputer Universitas Indonesia, 2001
S26947
UI - Skripsi Membership  Universitas Indonesia Library
cover
Indra Dimas Nurdiyanto
"Indonesia sejalan dengan pesatnya perkembangan teknologi dan informasi. Menjawab tantangan tersebut instansi ABC mengembangkan aplikasi XYZ sebagai salah satu solusi dalam pengamanan data dan informasi. Oleh karena itu, untuk memastikan kemampuan aplikasi tersebut dalam memberikan jaminan keamanan kepada pengguna, pada penelitian ini dilakukan analisis dan verifikasi keamanan protokol kriptografi aplikasi XYZ. Analisis dan verifikasi dilakukan melalui pendekatan verifikasi formal menggunakan alat bantu Scyther dengan focus pada protokol verifikasi pengguna, pembangkitan kunci, dan permintaan kunci untuk proses enkripsi-dekripsi. Hasil analisis menunjukan bahwa protokol-protokol tersebut telah menenuhi kriteria secrecy untuk informasi rahasia yang ditransmisikan namun memiliki kelemahan pada aspek autentikasi. Penerapan sharedsecret dan rangkaian cryptographic nonce terbukti mampu mengatasi kelemahan pada protokol verifikasi pengguna aplikasi XYZ.

The increasing threats and attacks that result in data leakage in Indonesia are in line with the rapid development of technology and information. Responding to these challenges, the ABC agency developed the XYZ application as a solution for data and information security. Therefore, to ensure the application's ability to provide security guarantees to users, this research analyzes and verifies the security of the XYZ application cryptographic protocol. Analysis and verification is carried out through a formal verification approach using Scyther tools with a focus on user verification protocols, key generation, and key requests for the encryption-decryption process. The results of the analysis show that these protocols have met the secrecy criteria for transmitted confidential information but have weaknesses in the authentication aspect. The application of shared secret and a series of cryptographic nonces is proven to be able to overcome weaknesses in the XYZ application user verification protocol."
Jakarta: Fakultas Teknik Universitas Indonesia, 2023
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011. The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications."
Berlin: Springer-Verlag, 2012
e20409515
eBooks  Universitas Indonesia Library
cover
Abdul Chandra Irawan
"Teknologi SMS sebagai media komunikasi dapat digunakan untuk mengendalikan perangkat IoT seperti SCADA Supervisory Control and Data Acquisition untuk pengontrolan suatu proses dalam sistem kendali industri berbasis computer . Serta sebagai alternatif yang handal pengganti media Internet untuk kendali jarak jauh. Namun, teknologi SMS masih memiliki kekurangan terhadap aksi penyadapan. Oleh karena itu pada penelitian ini dirancang pengendalian jarak jauh melalui SMS berbasis algoritma enkripsi NTRU dan kompresi GZIP yang di implementasikan pada Raspberry Pi dan perangkat Android.
Dari hasil uji coba penerapan algoritma NTRU dan GZIP pada Raspberry pi menghasilkan parameter bilangan prima 5 sampai 23 untuk membangun public key dan dalam proses enkripsi dekripsinya. Dengan rentang parameter tersebut membuat perintah dapat dikirim dalam 1 kali SMS tidak lebih dari 160-byte . Dengan menggunakan parameter optimal yaitu 23, implementasi enkrispi dan kompresi dilanjutkan pada hasil performa untuk menggerakan 3 aktuator relay, servo, dan LED PWM dengan 100 perintah yang dikirim berhasil diterjemahkan untuk dieksekusi pada aktuator.

SMS Technology as a communication medium can be used to control the IoT device for example, SCADA Supervisory Control And Data Acquisition . However, SMS technology still has a disadvantage of wiretapping. Therefore, in this study designed remote control system via SMS based NTRU Encryption and GZIP compression algorithm that is implemented on Raspberry Pi and Android devices to control the actuator.
Based on the result, the best parameter size of NTRU encryption and GZIP compression algorithm is 5 until 23 to build public key and encryption decryption process that can be sent in one time SMS not more than 160 bytes. Using the optimum parameter of 23, the encryption and compression implementation are continued on the performance result to drive three actuators relay, servo and LED PWM with 100 of the commands sent successfully decrypted for control the actuator.
"
Depok: Fakultas Teknik Universitas Indonesia, 2017
S68743
UI - Skripsi Membership  Universitas Indonesia Library
cover
Monica Sidarta
"[ ABSTRAK
Penggunaan komputer yang sebelumnya sebatas menjadi alat untuk
membantu komputasi, sekarang digunakan dalam proses mendesain. Dalam
melakukan proses desain dibutuhkan pemahaman akan pengguna dari desain
tersebut sehingga komputasi dilakukan sepanjang proses mendesain. Manusia
memiliki peran yang sangat penting terkait dnegan bagaimana pemenuhan
kebutuhan. Jika demikian bagaimana hubungan yang terdapat dalam pengguna
dan desain komputasi? bagaimana keterkaitan antar elemen yang terdapat dalam
hubungan tersebut? Penelitian ini mencoba melihat keterkaitan manusia dalam
sebuah desain komputasi yang berkembang di zaman sekarang melalui sebuah
observasi empiris dari pengguna. Adanya hubungan antara manusia dengan objek
hasil proses desain komputasi terbukti melalui analisis berdasarkan studi literatur
dan observasi pengguna terhadap desain komputasi pada karya seni River is...,
Korea Selatan. jaringan terdapat dalam pembentukan desain yang akhirnya
menjadi sebuah pola dan terus berkembang dalam desain tersebut dengan alur
yang tidak linear melainkan sirkular.
ABSTRACT The use of computers that were previously limited to be a tool to help
computing, is now used in the design process. In the process of design is required
understanding of the design so that the user of the computing is done throughout
the design process. Humans have a very important role associated circuitry how
fulfillment. If it so, how the relationship that contained in the user and
computational design? how the relationship between the elements contained in
that relationship? This study tried to look at the human connection in a growing
computational design today through an empirical observation of the user. The
existence of a relationship between man and the object of computational design
process results proved through analysis based on literature study and observation
of users to design computing on the artwork River is ..., South Korea. There
networks in the formation of the design that eventually became a pattern and
continues to evolve in the design of the grooves is not linear but circular;The use of computers that were previously limited to be a tool to help
computing, is now used in the design process. In the process of design is required
understanding of the design so that the user of the computing is done throughout
the design process. Humans have a very important role associated circuitry how
fulfillment. If it so, how the relationship that contained in the user and
computational design? how the relationship between the elements contained in
that relationship? This study tried to look at the human connection in a growing
computational design today through an empirical observation of the user. The
existence of a relationship between man and the object of computational design
process results proved through analysis based on literature study and observation
of users to design computing on the artwork River is ..., South Korea. There
networks in the formation of the design that eventually became a pattern and
continues to evolve in the design of the grooves is not linear but circular;The use of computers that were previously limited to be a tool to help
computing, is now used in the design process. In the process of design is required
understanding of the design so that the user of the computing is done throughout
the design process. Humans have a very important role associated circuitry how
fulfillment. If it so, how the relationship that contained in the user and
computational design? how the relationship between the elements contained in
that relationship? This study tried to look at the human connection in a growing
computational design today through an empirical observation of the user. The
existence of a relationship between man and the object of computational design
process results proved through analysis based on literature study and observation
of users to design computing on the artwork River is ..., South Korea. There
networks in the formation of the design that eventually became a pattern and
continues to evolve in the design of the grooves is not linear but circular;The use of computers that were previously limited to be a tool to help
computing, is now used in the design process. In the process of design is required
understanding of the design so that the user of the computing is done throughout
the design process. Humans have a very important role associated circuitry how
fulfillment. If it so, how the relationship that contained in the user and
computational design? how the relationship between the elements contained in
that relationship? This study tried to look at the human connection in a growing
computational design today through an empirical observation of the user. The
existence of a relationship between man and the object of computational design
process results proved through analysis based on literature study and observation
of users to design computing on the artwork River is ..., South Korea. There
networks in the formation of the design that eventually became a pattern and
continues to evolve in the design of the grooves is not linear but circular;The use of computers that were previously limited to be a tool to help
computing, is now used in the design process. In the process of design is required
understanding of the design so that the user of the computing is done throughout
the design process. Humans have a very important role associated circuitry how
fulfillment. If it so, how the relationship that contained in the user and
computational design? how the relationship between the elements contained in
that relationship? This study tried to look at the human connection in a growing
computational design today through an empirical observation of the user. The
existence of a relationship between man and the object of computational design
process results proved through analysis based on literature study and observation
of users to design computing on the artwork River is ..., South Korea. There
networks in the formation of the design that eventually became a pattern and
continues to evolve in the design of the grooves is not linear but circular, The use of computers that were previously limited to be a tool to help
computing, is now used in the design process. In the process of design is required
understanding of the design so that the user of the computing is done throughout
the design process. Humans have a very important role associated circuitry how
fulfillment. If it so, how the relationship that contained in the user and
computational design? how the relationship between the elements contained in
that relationship? This study tried to look at the human connection in a growing
computational design today through an empirical observation of the user. The
existence of a relationship between man and the object of computational design
process results proved through analysis based on literature study and observation
of users to design computing on the artwork River is ..., South Korea. There
networks in the formation of the design that eventually became a pattern and
continues to evolve in the design of the grooves is not linear but circular]"
Depok: Fakultas Teknik Universitas Indonesia, 2016
S61922
UI - Skripsi Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>