Anda di halaman 1dari 3

DAFTAR ISI

HALAMAN JUDUL ...................................................................................... i


LEMBAR PERSETUJUAN .......................................................................... ii
LEMBAR PERNYATAAN ........................................................................... iii
PERNYATAAN PERSETUJUAN PUBLIKASI ........................................ iv
LEMBAR PANITIA PENGUJI TESIS ....................................................... v
RIWAYAT HIDUP ........................................................................................ vi
ABSTRAK ...................................................................................................... vii
ABSTRACT .................................................................................................... viii
KATA PENGANTAR .................................................................................... ix
DAFTAR ISI................................................................................................... xi
DAFTAR TABEL .......................................................................................... xiv
DAFTAR GAMBAR ...................................................................................... xvi

BAB 1 – PENDAHULUAN
1.1. Latar Belakang Masalah ....................................................................... 1
1.2. Rumusan Masalah ................................................................................ 4
1.3. Batasan Masalah ................................................................................... 4
1.4. Tujuan Penelitian ................................................................................. 5
1.5. Manfaat Penelitian ............................................................................... 5

BAB 2 – LANDASAN TEORI


2.1. Kriptografi ............................................................................................ 6
2.1.1. Pengertian Kriptografi .............................................................. 6
2.1.2. Tujuan Kriptografi .................................................................... 6
2.1.3. Algoritma Kunci Simetris ........................................................ 7
2.1.4. Algoritma Kunci Asimetris ...................................................... 8
2.2. Algoritma Elgamal ............................................................................... 9
2.2.1. Pembentukan Kunci ................................................................. 11
2.2.2. Proses Enkripsi ......................................................................... 12
2.2.3. Proses Deskripsi ....................................................................... 13

xi
2.3. Algoritma RSA..................................................................................... 14
2.3.1. Pembentukan Kunci ................................................................. 14
2.3.2. Proses Enkripsi ......................................................................... 15
2.3.3. Proses Deskripsi ....................................................................... 15
2.4. Digital signature .................................................................................. 16
2.5. Fungsi Hash .......................................................................................... 18
2.6. Algoritma MD5 .................................................................................... 19
2.7. Pembangkit Bilangan Acak Semu ........................................................ 21
2.7.1. Syarat Algoritma Pembangkit Bilangan Acak Semu ............... 21
2.7.2. Blum-Blum Shub (BBS) .......................................................... 21
2.8. Landasan Matematika Kriptografi ....................................................... 23
2.7.1. Bilangan Prima ......................................................................... 23
2.7.2. Pembagi Bilangan Terbesar (PBB) .......................................... 23
2.7.3. Relatif Prima............................................................................. 25
2.7.4. Aritmatika Modula ................................................................... 25
2.7.5. Lehmann Primality Test ........................................................... 26
2.7.6. Invers Modulo .......................................................................... 26
2.7.7. Euler Totient ............................................................................. 28
2.9. Penelitian Terkait ................................................................................. 28

BAB 3 – METODE PENELITIAN


3.1. Analisa Masalah ................................................................................... 30
3.2. Analisis Penyelesaian Masalah ............................................................ 33
3.2.1. Analisa Input ............................................................................ 34
3.2.2. Analisis Proses ......................................................................... 36
1. Pembangkitan Kunci .......................................................... 37
2. Pembentukan Digital signature .......................................... 39
3. Pengujian Keaslian File...................................................... 43
3.2.3. Analisis Output ......................................................................... 47
1. Output Pengirim File .......................................................... 48
2. Output Penerima File ......................................................... 49
3.2.4. Perancangan Model Digital signature...................................... 50
1. Sisi Pengirim File ............................................................... 51

xii
2. Sisi Penerima File .............................................................. 53
3.2.5. Fungsi-Fungsi Algoritma yang Digunakan .............................. 54
3.3. Implementasi dan Pengujian Model Digital signature ........................ 54
3.3.1. Perangkat Keras ........................................................................ 54
3.3.2. Perangkat Lunak ....................................................................... 55
3.3.3. File............................................................................................ 55
3.4. Analisis Keamanan ............................................................................... 55

BAB 4 – HASIL DAN PEMBAHASAN


4.1. Pengujian Algoritma ............................................................................ 57
4.1.1. Tahap pembangkitan kunci ...................................................... 57
4.1.2. Tahap sisi pengirim file ............................................................ 61
4.1.3. Tahap sisi penerima file ............................................................ 77
4.2. Implementasi Algoritma ...................................................................... 80
4.2.1. Pembangkitan kunci oleh penerima file ................................... 81
4.2.2. Pembentukan digital signature ................................................. 82
4.2.3. Menguji Keaslian File .............................................................. 84
4.3. Hasil Pengujian Algoritma ................................................................... 89
4.4. Konstribusi Penelitian .......................................................................... 91
4.5. Analisis Keamanan .............................................................................. 91
4.4.1. Keamanan pengujian keaslian data .......................................... 91
4.4.2. Keamanan algoritma MD5 ....................................................... 93
4.4.3. Keamanan algoritma RSA ........................................................ 93
4.4.4. Keamanan algoritma Elgamal .................................................. 94

BAB 5 – HASIL DAN PEMBAHASAN


5.1. Kesimpulan .......................................................................................... 96
5.2. Saran .................................................................................................... 97

DAFTAR PUSTAKA

xiii

Anda mungkin juga menyukai