Upload a presentation to download PROBLEM SOLVING LDK.pptx

MarketingStaff2 12 views 17 slides Sep 13, 2024
Slide 1
Slide 1 of 17
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17

About This Presentation

kriptografi


Slide Content

Cryptography Keamanan Jaringan - 2019

Overview If we hear the word cryptography our first associations might be e-mail encryption, secure website access, smart cards for banking applications or code breaking during World War II, such as the famous attack against the German Enigma encryption machine

Cryptography seems closely linked to modern electronic communication. However, cryptography is a rather old business, with early examples dating back to about 2000 B.C., when non-standard “secret” hieroglyphics were used in ancient Egypt. For instance, there are documented cases of secret writing in ancient Greece, namely the scytale of Sparta

Overview of the field of cryptology Cryptography is the science of secret writing with the goal of hiding the meaning of a message. Cryptanalysis is the science and sometimes art of breaking cryptosystems. Relation >> cryptanalysis is the only way to assure that a cryptosystem is secure

Symmetric Cryptography Symmetric cryptographic schemes are also referred to as symmetric-key, secret-key, and single-key schemes or algorithms.

Symmetric Cryptography In this situation, symmetric cryptography offers a powerful solution: Alice encrypts her message x using a symmetric algorithm, yielding the ciphertext y. Bob receives the ciphertext and decrypts the message.

Symmetric Cryptography Simple Symmetric Encryption: The Substitution Cipher The goal of the substitution cipher is the encryption of text (as opposed to bits in modern digital systems). The idea is very simple: We substitute each letter of the alphabet with another one.

Symmetric Cryptography Shift Cipher (or Caesar Cipher) : We simply shift every plaintext letter by a fixed number of positions in the alphabet.

Symmetric Cryptography The symmetric ciphers can be divided into stream ciphers and block ciphers

Stream Ciphers vs. Block Ciphers Symmetric cryptography is split into block ciphers and stream ciphers, which are easy to distinguish. Figure 2.2 depicts the operational differences between stream (Fig. 2.2a) and block (Fig. 2.2b) ciphers when we want to encrypt b bits at a time, where b is the width of the block cipher.

Stream Ciphers vs. Block Ciphers Stream ciphers encrypt bits individually. This is achieved by adding a bit from a key stream to a plaintext bit. Block ciphers encrypt an entire block of plaintext bits at a time with the same key. This means that the encryption of any plaintext bit in a given block depends on every other plaintext bit in the same block

Asymmetric Cryptography Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair can be shared with everyone; it is called the public key. The other key in the pair is kept secret; it is called the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.

Asymmetric vs. Symmetric Cryptography The main difference between these two methods of encryption is that asymmetric encryption algorithms makes use of two different but related keys -- one key to encrypt the data and another key to decrypt it -- while symmetric encryption uses the same key to perform both the encryption and decryption functions. Another difference between asymmetric and symmetric encryption is the length of the keys. In symmetric cryptography, the length of the keys -- which is randomly selected -- are typically set at 128-bits or 256-bits, depending on the level of security that's needed.

Asymmetric vs. Symmetric Cryptography Asymmetric cryptography Symmetric cryptography

Benefits and disadvantages of asymmetric cryptography Advantage : the key distribution problem is eliminated because there's no need for exchanging keys. security is increased as the private keys don't ever have to be transmitted or revealed to anyone. the use of digital signatures is enabled so that a recipient can verify that a message comes from a particular sender. it allows for non-repudiation so the sender can't deny sending a message.

Benefits and disadvantages of asymmetric cryptography Disadvantages : it's a slow process compared to symmetric crytography , so it's not appropriate for decrypting bulk messages. if an individual loses his private key, he can't decrypt the messages he receives. since the public keys aren't authenticated, no one really knows if a public key belongs to the person specified. Consequently, users have to verify that their public keys belong to them. if a hacker identifies a person's private key, the attacker can read all of that individual's messages.

Tugas 1 Carilah informasi mengenai kelemahan Symmetric Cryptography, dan buatlah simulasi proses eksploitasi kelemahan yang dimaksud tersebut ! Buatlah presentasi powerpoint tentang contoh implementasi stream ciphers dan block ciphers Tugas di presentasikan minggu depan !!
Tags