PENGAMANAN DATA PADA LALU LINTAS DATA MENGGUNAKAN FUNGSI KRIPTOGRAFI RSA DARI SERANGAN SNOOPING
DOI:
https://doi.org/10.29103/techsi.v11i3.1971Abstract
Abstrak
Perkembangan teknologi saat ini begitu pesat kemajuan nya ,terutama pada perkembangan teknologi jaringan komputer. Perkembangan teknologi jaringan komputer menyebabkan terkaitnya satu komputer dengan komputer lainnya sehingga dapat melakukan pertukaran data . Dalam era ini yang dimaksud dengan pertukaran data antara dua buah komputer bisa menjadi hal yang sangat luas ,sebagai contoh perjalanan sebuah e-mail dari satu server ke server yang lainnya.Dan Dalam perkembangan teknologi ini membuka besar peluang dalam pengembangan aplikasi komputer akan tetapi juga membuat peluang adanya ancaman terhadap pengubahan dan pencurian data oleh pihak pihak yang tidak bertanggung jawab dan sangatlah merugikan sipemilik data. Saat ini kita sangat mebutuhkan pengamanan terhadap lalu lintas data pada jaringan. Dengan meningkatkan keamanan menggunakan fungsi kriptografi RSA kita bisa lebih percaya tingkat keamanan data lebih terjaga dari serangan yang dilakukan oleh pihak pihak tidak bertanggung jawab.Data juga dapat terjaga keasliannya dan lebih efisien.
Kata Kuci- Pengamanan data , Kriptografi, RSA
Abstract
The development of technology is currently so rapid progress, especially in the development of computer network technology. The development of computer network technology led to the association of one computer with another computer so that it can exchange data. In this era what is meant by the exchange of data between two computers can be very broad, for example the journey of an e-mail from one server to another server. And in the development of this technology opens great opportunities in developing computer applications but also makes the opportunity for threats to alteration and theft of data by irresponsible parties is very detrimental to the owner of the data. At present we are very much in need of security against data traffic on the network. By increasing security using the RSA cryptographic function, we can be more confident in the level of data security that is safer from attacks by irresponsible parties. Data can also be authenticated and more efficient.
Key Words- Data security, Cryptography, RSA
References
Sadikin,Rifki.2012.Kriftografi Untuk Keamanan Jaringan. Andi Offset: Yogyakarta.
Oppliger, Rolf. 2005. Contemporary Cryptography. USA: Artech House, Inc.
Ariyus, D 2008. Pengantar Ilmu Kriptografi. Andi Offset : Yogyakarta.
Munir, R. 2006. Kriptografi. Informatika: Bandung.
Aulia, N. Aplikasi Enkripsi dan Dekripsi menggunkan Visual Basic 2012 dengan Algoritma Triple DES,20 Mei 2016.
Talbot, Jhon dan Dominic Welsh. 2006. Complexity and Cryptography. USA : Cambridge University Press.
Menezes, Oorcshot, and Vanstone. 1996. Handbook of Applied Cryptography. USA : CRC Press, Inc.
Zelvina Anandia, Efendi Syahril, Arisandi Dedy Perancangan Aplikasi Pembelajaran Kriptografi Kunci Publik ElGamal Untuk Mahasiswa JURNAL DUNIA TEKNOLOGI INFORMASI Vol. 1, No. 1, (2012) 56-62
Downloads
Published
Issue
Section
License
Authors retain copyright and grant the journal right of first publication and this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 that allows others to share the work with an acknowledgement of the works authorship and initial publication in this journal.
All articles in this journal may be disseminated by listing valid sources and the title of the article should not be omitted. The content of the article is liable to the author.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
In the dissemination of articles by the author must declare the TECHSI Journal as the first party to publish the article.
