Anda di halaman 1dari 4

DAFTAR ISI

Halaman

HALAMAN JUDUL........................................................................................ i
HALAMAN PERNYATAAN........................................................................... iii
HALAMAN PENGESAHAN.......................................................................... iv
KATA PENGANTAR....................................................................................... v
HALAMAN PERNYATAAN PERSETUJUAN.............................................. vi
ABSTRAK........................................................................................................ vii
ABSTRACT..................................................................................................... viii
DAFTAR ISI..................................................................................................... ix
DAFTAR GAMBAR........................................................................................
DAFTAR TABEL.............................................................................................
BAB I PENDAHULUAN .......................................................................... 1
1.1 Latar Belakang.......................................................................... 1
1.2 Rumusan Permasalahan ........................................................... 3
1.3 Batasan Masalah....................................................................... 3
1.4 Tujuan....................................................................................... 4
1.5 Sitematika Penulisan................................................................. 4

BAB II TINJAUAN PUSTAKA................................................................... 6


2.1 Penelitian Terkait .................................................................... 6
2.2 Pretty Good Privacy (PGP)...................................................... 6
2.2.1 Dasar - Dasar PGP........................................................... 7
2.2.2 Prinsip Kerja PGP............................................................ 8
2.3 Cipher Feedback (CFB)........................................................... 12
2.4 RSA .........................................................................................13
2.5 SHA-1 ......................................................................................13
BAB III METODOLOGI PENELITIAN..................................................... 14
3.1 Lokasi dan Tempat Penelitian................................................... 14
3.2 Metode Penelitian..................................................................... 14
3.2 Pengumpulan Data.................................................................... 15

ix
3.3 Analisa Kebutuhan.................................................................... 15
3.4. Use Case................................................................................... 19
3.5 Diagram Activity Enkripsi File................................................. 19
3.6 Diagram Activity Dekripsi File................................................. 20
3.7 Pembahasan Penelitian............................................................. 21
3.6 Pengujian.................................................................................. 22
3.7 Pembuatan Laporan.................................................................. 22
BAB IV HASIL DAN PEMBAHASAN........................................................ 19
4.1 Hasil Penelitian ........................................................................ 19
4.1.1 Penggunaan Aplikasi Enkripsi...................................... 19
4.1.2 Analisa Perbandingan Email Relguler dan PGP........... 28
Bab V PENUTUP…………………............................................................ 30
5.1 Kesimpulan……....................................................................... 30
5.2 Saran ........................................................................ 30
DAFTAR PUSTAKA ……………………….................................... 31

x
DAFTAR GAMBAR

Gambar 2.2.1 Enkripsi Publik Key.................................................................. 8


Gambar 2.2.2 Cara Kerja Enkripsi PGP ......................................................... 9
Gambar 2.3a Skema Enkripsi CFB................................................................... 13
Gambar 2.3b Skema Deskripsi CFB ................................................................
Gambar 3.1 Metodologi Penelitian PGP.......................................................... 14
Gambar 3.5 Use Case ...................................................................................... 19
Gambar 3.6 Diagram Actifity Enkripsi File...................................................... 20
Gambar 3.7 Diagram Actifity Deskripsi File.................................................... 21
Gambar 3.1d Enkripsi Email ........................................................................ 16
Gambar 3.1e Deskripsi Email........................................................................ 17
Gambar 4.1.1 Halaman Awal Enskrip............................................................... 23
Gambar 4.1.1 Halaman Login ........................................................................ 24
Gambar 4.1.1 Penggunaan Aplikasi Enskrip.................................................... 25
Gambar 4.1.1 Memilih file Deskripsi .............................................................. 26
Gambar 4.1.1 tabulasi Decrypt ........................................................................ 27
Gambar 4.1.1 Memasukan Public Key............................................................. 27

xi
DAFTAR TABEL

Tabel 4.1.2 Tabel Kompresi File.................................................................. 24


Tabel 4.1.2 Tabel Perbandingan Size File.................................................... 24

xii