Anda di halaman 1dari 2

DAFTAR ISI

HALAMAN
JUDUL..........................................................................i
LEMBAR
PENGESAHAN.............................................................iii
LEMBAR PERNYATAAN .............................................................v
ABSTRAK.......................................................................................vii
ABSTRACT
.....................................................................................ix
KATA
PENGANTAR.....................................................................xi
DAFTAR
ISI..................................................................................xiii
DAFTAR GAMBAR ....................................................................xvii
DAFTAR
TABEL..........................................................................xix
DAFTAR
GRAFIK.......................................................................xxi
DAFTAR SOURCECODE .........................................................xxiii
BAB IPENDAHULUAN.................................................................1
1.1 Latar Belakang.........................................................................1
1.2 Rumusan Masalah....................................................................3
1.3 Tujuan penelitian .....................................................................3
1.4 Manfaat....................................................................................3
1.5 Batasan Masalah ......................................................................3
1.6 Sistematika Penulisan ..............................................................4
BAB II TINJAUAN PUSTAKA......................................................5
2.1 Kriptografi................................................................................5
2.2 Algoritma Kriptografi..............................................................6
2.3 LandasanMatematikaKriptografi...........................................7
2.3.1 Operasi XOR ....................................................................7
2.4 Tipe Dan Model Algoritma Kriptografi...................................9
2.4.1 Bit String...........................................................................9
2.4.2 Stream Chiper...................................................................9
2.4.3 Block Chiper...................................................................10
2.4.4 Jaringan Feistel..............................................................12
2.4.5 Padding...........................................................................12
2.5 Algoritma Blowfish ................................................................13
2.5.1 Struktur Algoritma Blowfish...........................................13
2.5.2 Proses Penghitungan Subkey..........................................13
2.5.3 Proses Enkripsi...............................................................14

2.5.4 Proses Dekripsi ...............................................................16


2.6 Avalanche Effect...................................................................16
BAB III METODOLOGI DAN PERANCANGAN.....................19
3.1 Analisis Perangkat Lunak....................................................20
3.1.1 Deskripsi Perangkat Lunak............................................20
3.1.2 Batasan Perangkat Lunak................................................23
3.2 Perancangan Perangkat Lunak ...........................................23
3.2.1 Perancangan Proses Input Perangkat Lunak ...................23
3.2.2 Perancangan Proses Penghitungan subkey.....................23
3.2.3 Perancangan Proses Enkripsi ..........................................28
3.2.5 Perancangan Proses Dekripsi..........................................29
3.3 Perhitungan Matematis..........................................................35
3.3.1 Perhitungan Subkey........................................................35
3.3.2 Perhitungan Enkripsi....................................................44
3.3.3 Perhitungan Dekripsi .....................................................47
3.4 Perancangan Interface .........................................................50
3.5 Perancangan Analisis Waktu proses dan Avalanche Effect 51
BAB IV IMPLEMENTASI DAN PEMBAHASAN.....................55
4.1 Lingkungan Implementasi..................................................55
4.1.2 Lingkungan Perangkat Keras..........................................55
4.1.3 Lingkungan Perangkat Lunak.........................................55
4.2 Implementasi Program ........................................................55
4.2.1 Proses Input File .............................................................55
4.2.2 Proses Penghitungan Subkey...........................................57
4.2.3 Proses Enkripsi...............................................................60
4.2.4 Proses Dekripsi ..............................................................64
4.2.5 Proses avalanche effect..................................................64
4.3 Implementasi Interface...........................................................66
4.4 Hasil Uji .................................................................................70
4.5 Analisis hasil .........................................................................82
BAB V KESIMPULAN DAN SARAN..........................................89
5.1 Kesimpulan ............................................................................89
5.2 Saran.......................................................................................89
DAFTAR PUSTAKA .....................................................................91

Anda mungkin juga menyukai