Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
12Activity
0 of .
Results for:
No results containing your search query
P. 1
Makalah Keamanan Komputer - Fungsi Hash Pada Keamanan Komputer

Makalah Keamanan Komputer - Fungsi Hash Pada Keamanan Komputer

Ratings: (0)|Views: 902 |Likes:
Published by Junaedi Pratama

More info:

Published by: Junaedi Pratama on Jan 17, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/06/2013

pdf

text

original

 
 
MAKALAH KEAMANAN KOMPUTER 
FUNGSI HASH PADA KEAMANAN KOMPUTER 
Di Susun Oleh :
Junaedi Pratama
200643500072Teknik Informatika
FAKULTAS TEKNIK, MATEMATIKA DAN ILMU PENGETAHUAN ALAM
UNIVERSITAS INDRAPRASTA PGRI
 
 
KATA PENGANTAR
Puji syukur penulis panjatkan atas kehadirat Allah SWT dan junjungan besar NabiMuhammad SAW, karena atas Rahmat dan Hidayah-Nya sehingga penulis dapatmenyelesaikan makalah ini tepat waktu.Melalui makalah ini, penulis ingin mengucapkan terima kasih yang sebesar-besarnya kepada pembimbing mata kuliah (Dosen) dan semua pihak yang terlibat dalampenyelesaian makalah ini.Penulis menyadari dalam makalah ini masih terdapat banyak kekurangan, olehkarena itu penulis sangat mengharapkan saran dan kritik yang tentunya bersifatmembangun demi kesempurnaan makalah ini.Depok, 9 Desember 2009Penulis
 
 
DAFTAR ISI
KATA PENGANTAR.......................................................................................... iDAFTAR ISI......................................................................................................... iiBAB I PENDAHULUAN................................................................................. 1A. Latar Belakang................................................................................. 1B. Rumusan Masalah............................................................................ 2C. Tujuan Penulisan.............................................................................. 3BAB II PEMBAHASAN.................................................................................... 4A. Pengertian Kriptografi..................................................................... 4B. Konsep Penggunaan Kriptografi...................................................... 41. Kerahasiaan (Confidentiality).................................................... 42. Integritas (Integrity)................................................................... 43. Penghindaran Penolakan (Non-repuditation)............................. 44. Autentikasi (Authentication)...................................................... 45. Tanda Tangan Data (Data Signature)........................................ 46. Kontrol Akses (Access Control)................................................ 4C. Pengertian Fungsi Hash................................................................... 4D. Metode yang Digunakan Dalam Fungsi Hash................................. 61. Metode Pembagian..................................................................... 62. Metode Perkalian....................................................................... 6E. Macam-Macam Fungsi Hash........................................................... 61. Metode Pembagian Bersisa (division-remainder method)......... 62. Melipat (folding)........................................................................ 63. Transformasi Radiks (radix transformation).............................. 74. Pengaturan Ulang Digit Radiks (radix transformation)............. 7F. Bentrokan Pada Fungsi Hash........................................................... 71. Kebijakan Resolusi Bentrokan di Luar Table............................ 72. Kebijakan Resolusi Bentrokan di Dalam Table......................... 8a. Linear Probing..................................................................... 9b. Quadratic probing / squared probing................................... 9c. Double hashing.................................................................... 93. Perbandingan antara metode chaining dan open addressing...... 94. Metode-Metode Lain................................................................. 10a. Coalesced hashing................................................................ 10b. Perfect hashing..................................................................... 10c. Probabilistic hashing............................................................ 10d. Robin Hood hashing............................................................ 11G. Pengertian MD5............................................................................... 11H. Langkah-Langkah Pembuatan MD.................................................. 111. Penambahan Bit-bit Pengganjal................................................. 112. Penambahan Nilai Panjang Pesan.............................................. 113. Inisialisai Penyangga MD.......................................................... 114. Pengolahan Pesan dalam Blok Berukuran 512 bit..................... 12

Activity (12)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Di A Na liked this
andhika_p_2 liked this
Abdul Halim liked this
Abdul Halim liked this
guz suyAsa' liked this
palayganteng liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->