Anda di halaman 1dari 6

DAFTAR ISI

H A LA M A N JU D U L.......................................................................................................... i
LEMBAR PENGESAHAN PEMBIMBING.................................................................ii
LEMBAR PERNYATAAN KEASLIAN..................................................................... iii
LEMBAR PENGESAHAN PENGUJI..........................................................................iv
PERSEMBAHAN..............................................................................................................v
MOTTO............................................................................................................................ vii
KATA PEN GA N TA R..................................................................................................viii
SARI................................................................................................................................... xi
DAFTAR G A M BA R..................................................................................................... xv
BAB I PENDAHULUAN...............................................................................................1
1.1 Latar Belakang M asalah............................................................................................. 1
1.2 Rumusan M asalah...................................................................................................... 2
1.3 Batasan Masalah..........................................................................................................2
1.4 Tujuan Penelitian........................................................................................................3
1.5 Manfaat Penelitian..................................................................................................... 3
1.6 Metodologi Penelitian................................................................................................4
1.6.1 Metode Pengumpulan D ata............................................................................... 4
1.6.2 Metode pengembangan Sistem .........................................................................4
1.7 Sistematika Penulisan.................................................................................................5
BAB II LANDASAN T E O R I....................................................................................... 7
2.1 Keamanan Teknologi Informasi................................................................................7

2.1.1 A utentikasi........................................................................................................... 7
2.1.2 Secure Sockets Layer (SSL)............................................................................... 8
2.1.3 Public Key Cryptography................................................................................... 9
2.1.4 Digital Signature................................................................................................ 11
2.1.5 Certificate of Authority (CA)........................................................................... 14
2.2 Fungsi Hash................................................................................................................ 15
2.2.1 SHA (Secure Hash Algorithm)........................................................................16
2.2.2 Kekurangan dan Kelebihan SHA1.................................................................. 16
2.2.2 Sertifikat X .509..................................................................................................17
2.3 M D 5............................................................................................................................ 18
2.3.1 Message D igest..................................................................................................18
2.3.2 Sekilas M D5....................................................................................................... 19
2.3.3 Kekurangan dan Kelebihan MD5....................................................................20
2.4 Secure Socket Layer (SSL)..................................................................................... 21
2.4.1 Protokol S S L ......................................................................................................21
2.5 O penSSL....................................................................................................................22
2.6 Ethereal Packet Sniffer.............................................................................................22
BAB III ANALISIS KEBUTUHAN PERANGKAT L U N A K ............................... 24
3.1 Metode A nlisis....................................................................................................... 24
3.2 Anlisis Kebutuhan Masukan dan Keluaran.........................................................24
3.2.1 Kebutuhan Antarm uka.....................................................................................26
3.2.2 Kebutuhan S istem ............................................................................................ 27
BAB IV PERANCANGAN PERANGKAT LUNAK............................................... 28

4.1 Metode Perancangan.............................................................................................. 29


4.2 Hasil Perancangan.................................................................................................. 29
4.2.1 Perancangan Ragam D ialog.......................................................................... 32
BAB V IMPLEMENTASI............................................................................................. 33
5.1 Batasan Im plem entasi............................................................................................34
5.2 Implementasi Sistem ..............................................................................................34
5.2.1 Implementasi Perangkat Keras...................................................................... 35
5.2.2 Implementasi Pemgkat Lunak....................................................................... 35
5.2.2.1 Implementasi dengan Menggunakan Algoritma RSA dan M D 5......35
5.2.2.1 Implementasi dengan Menggunakan Algoritma RSA dan SHA1..... 44
5.2.3 Tampilan penggunaan sistem........................................................................ 45
BAB VI ANALISIS KINERJA PERANGKAT LUNAK.........................................49
6.1 Penanganan kesalahan............................................................................................. 49
6.2 Anlisis Input........................................................................................................... 49
6.3 Anlisis Output......................................................................................................... 50
6.4 Anlisis Perbandingan............................................................................................. 50
6.4.1 Anlisis perbandingan program enkripsi....................................................... 52
6.4.1.1 Program Enkripsi dengan M D 5.............................................................. 52
6.4.1.2 Program Enkripsi dengan Algoritma SHA1 ......................................... 54
6.5 Anlisis Tingkat Keamanan............................................................................... 55
6.6 Tabel 6-1 Perbandingan algoritma SHA1 dan M D5......................................56
BAB VII PENUTUP...................................................................................................... 60
7.1 Kesimpulan dan Saran.............................................................................................60

xiv

7.1.1 K esim pulan....................................................................................................... 60


7.1.2 Saran................................................................................................................... 60
DAFTAR PU STA K A ....................................................................................................62

XV

DAFTAR GAMBAR

Gambar 2.1 Enkripsi publick k e y ........................................................................ 11


Gambar 2.2 Tanda Tangan Digital (digital signature) sederhana.................... 14
Gambar 2.2.2 Serrtifikat X.509............................................................................ 18
Gambar 2.4 View o f ethereal....................................................................................23
Gambar 3.1 Diagram Proses Kerja.......................................................................26
Gambar 4.1 Cara Kerja Sistem............................................................................. 32
Gambar 4.2 Diagram Cara Kerja............................................................................. 32
Garrlbar 5.2 Peringatan untuk Pengguna................................................................. 45
Gambar 5.3 Sertifikat Digital untruted....................................................................45
Gambar 5.4 Sertifikat Digital trusted...................................................................... 46
Gambar 5.5 Lock Icon ............................................................................................46
Gambar 6.6 Click to Verify ....................................................................................47
Gambar 5.7 Certyificate from CA............................................................................47

xvi

DAFTAR TABEL

Tabel 6-1 Perbandingan Algoritma SHA1 dan MD5