Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
160Activity
×
0 of .
Results for:
No results containing your search query
P. 1
Keamanan Komputer

Keamanan Komputer

Ratings:

4.64

(11)
|Views: 33,014|Likes:
Published by athye

More info:

Published by: athye on Feb 08, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, DOC, TXT or read online from Scribd
See More
See less

05/28/2013

pdf

text

original

 
Makalah Keamanan Komputer 
Oleh :SITTI NURHAERATY (60200105042)
JURUSAN TEKNIK INFORMATIKAFAKULTAS SAINS DAN TEKNOLOGIUNIVERSITAS ISLAM NEGERIMAKASSAR2008
 
KATA PENGANTAR 
Puji syukur penulis panjatkan atas kehadirat Allah SWT dan junjungan besar NabiMuhammad SAW, karena atas Rahmat dan Hidayah-Nya sehingga penulis dapatmenyelesaikan makalah ini tepat waktu.Melalui makalah ini, penulis ingin mengucapkan terima kasih yang sebesar- besarnya kepada pembimbing mata kuliah (Dosen) dansemua pihak yang terlibat dalam penyelesaian makalah ini.Penulis menyadari dalam makalah ini masih terdapat banyak kekurangan, olehkarena itu penulis sangat mengharapkan saran dan kritik yang tentunya bersifatmembangun demi kesempurnaan makalah ini.Makassar, Juni 2008 Penulis
 
DAFTAR ISI
KATA PENGANTAR............................................................................................ iDAFTAR ISI.......................................................................................................... iiBAB IPENDAHULUAN.................................................................................. 1A.Latar Belakang.................................................................................. 1B.Rumusan Masalah............................................................................ 2C.Tujuan Penulisan.............................................................................. 3BAB II PEMBAHASAN..................................................................................... 4A.Pengertian Kriptografi...................................................................... 4B.Konsep Penggunaan Kriptografi...................................................... 41.Kerahasiaan (Confidentiality).................................................... 42.Integritas (Integrity).................................................................... 43.Penghindaran Penolakan (Non-repuditation)............................. 44.Autentikasi (Authentication)...................................................... 45. Tanda Tangan Data (Data Signature).......................................... 46.Kontrol Akses (Access Control)................................................. 4C.Pengertian Fungsi Hash.................................................................... 4D.Metode yang Digunakan Dalam Fungsi Hash.................................. 61.Metode Pembagian..................................................................... 62. Metode Perkalian........................................................................ 6E.Macam-Macam Fungsi Hash............................................................ 61.Metode Pembagian Bersisa (division-remainder method)......... 62.Melipat (folding)........................................................................ 63.Transformasi Radiks (radix transformation).............................. 74.Pengaturan Ulang Digit Radiks (radix transformation).............. 7F.Bentrokan Pada Fungsi Hash............................................................ 71.Kebijakan Resolusi Bentrokan di Luar Table............................. 72.Kebijakan Resolusi Bentrokan di Dalam Table.......................... 8a.Linear Probing...................................................................... 9 b.Quadratic probing / squared probing.................................... 9c.Double hashing..................................................................... 93.Perbandingan antara metode chaining dan open addressing...... 94.Metode-Metode Lain.................................................................. 10a.Coalesced hashing................................................................ 10 b.Perfect hashing..................................................................... 10c.Probabilistic hashing............................................................ 10d. Robin Hood hashing............................................................. 11G.Pengertian MD5................................................................................ 11H.Langkah-Langkah Pembuatan MD................................................... 111.Penambahan Bit-bit Pengganjal................................................. 112.Penambahan Nilai Panjang Pesan.............................................. 113.Inisialisai Penyangga MD........................................................... 114.Pengolahan Pesan dalam Blok Berukuran 512 bit..................... 12I.Cara Kerja MD5............................................................................... 13J.Proses MD5 dengan Berbagai Macam Masukan.............................. 14

Activity (160)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Jimi Ali Baba liked this
Mamii Meisya liked this
You Gie liked this
Erlan Baim liked this
Lia Intifadha liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->