RINGKASAN ..............................................................................................
SUMMARY .................................................................................................
KATA PENGANTAR ..................................................................................
DAFTAR ISI ...............................................................................................
DAFTAR TABEL ........................................................................................
DAFTAR GAMBAR ....................................................................................
DAFTAR ALGORITMA ..............................................................................
iv
v
vi
vii
ix
x
xiv
PENDAHULUAN .................................................................................
1.1 Latar Belakang ..............................................................................
1.2 Rumusan Masalah ........................................................................
1.3 Batasan Masalah ..........................................................................
1.4 Tujuan Penelitian ..........................................................................
1.5 Manfaat Penelitian ........................................................................
1
1
2
3
3
4
II
5
5
7
8
11
13
16
18
19
20
20
21
23
25
27
28
30
31
34
34
37
37
38
38
45
45
47
47
47
51
55
59
59
60
60
61
62
64
65
66
66
68
70
73
76
78
80
82
85
87
91
92
95
99
103
108
112
118
122
127
132
137
143
164
164
166
167
5.2
5.3
5.4
ii
DAFTAR TABEL
Halaman
Tabel 4.1 Proses-proses yang terjadi dalam kriptografi ElGamal .............
41
43
48
51
52
54
56
95
Tabel 6.2 Data hasil pengujian kriptografi Vigenere Cipher (295 X 200) . .
149
Tabel 6.3 Data hasil pengujian kriptografi Vigenere Cipher (800 X 600) . .
150
Tabel 6.4 Data hasil pengujian kriptografi Vigenere Cipher (1024 X 768)
151
152
154
Tabel 6.7 Data hasil pengujian kriptografi ElGamal (295 X 200) ..............
156
Tabel 6.8 Data hasil pengujian kriptografi ElGamal (800 X 600) ..............
157
Tabel 6.9 Data hasil pengujian kriptografi ETV (295 X 200) .....................
158
Tabel 6.10 Data hasil pengujian kriptografi ETV (800 X 600) .....................
162
Tabel 6.11 Waktu rata-rata setiap proses pada setiap metode ...................
163
iii
DAFTAR GAMBAR
Halaman
Gambar 2.1
10
Gambar 2.2
11
Gambar 2.3
12
Gambar 2.4
14
Gambar 2.5
17
Gambar 2.6
28
Gambar 3.1
34
Gambar 3.2
36
Gambar 4.1
39
Gambar 4.2
40
Gambar 4.3
40
Gambar 4.4
42
Gambar 4.5
42
Gambar 4.6
42
Gambar 4.7
44
Gambar 4.8
44
Gambar 4.9
44
Gambar 5.1
48
Gambar 5.2
48
Gambar 5.3
53
Gambar 5.4
53
Gambar 5.5
53
Gambar 5.6
58
Gambar 5.7
58
Gambar 5.8
58
Gambar 5.9
60
61
Gambar 5.11 Data flow diagram level 2 Eksekusi Pilihan User ..................
62
65
66
67
iv
69
71
74
77
79
81
83
86
88
91
93
Gambar 6.1
100
Gambar 6.2
100
Gambar 6.3
101
Gambar 6.4
101
Gambar 6.5
101
Gambar 6.6
103
Gambar 6.7
104
Gambar 6.8
104
Gambar 6.9
105
105
105
106
107
107
108
109
109
110
110
110
Gambar 6.21 Sampling piksel hasil enkripsi Triple Vigenere Cipher ..........
111
112
113
113
114
114
114
115
Gambar 6.29 Sampling piksel hasil dekripsi Triple Vigenere Cipher ..........
115
116
Gambar 6.31 Sampling piksel hasil dekripsi Triple Vigenere Cipher ..........
117
117
118
119
119
120
120
121
122
123
123
124
124
124
125
126
127
128
128
129
129
129
130
131
131
132
133
133
134
vi
134
134
135
135
135
137
138
138
139
139
139
140
140
142
142
143
144
144
145
145
145
146
146
146
148
148
149
vii
DAFTAR ALGORITMA
Halaman
Algoritma 2.1
23
Algoritma 5.1
67
Algoritma 5.2
68
Algoritma 5.3
69
Algoritma 5.4
70
Algoritma 5.5
73
Algoritma 5.6
76
Algoritma 5.7
77
Algoritma 5.8
78
Algoritma 5.9
80
82
85
87
91
92
94
viii