Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 1331 dokumen yang sesuai dengan query
cover
Oxford: Clarendon Press, 1993
003.54 CRY
Buku Teks SO  Universitas Indonesia Library
cover
Miftahul Haq
"Citra digital merupakan salah satu media penyimpanan informasi yang sering digunakan saat ini sehingga dibutuhkan suatu skema yang dapat menjaga keamanan informasi pada citra digital. Oleh karena itu, dirancang algoritma enkripsi citra digital berbasis chaos dengan coding DNA dan elliptic curve Diffie-Hellman. Hasil yang diperoleh dari elliptic curve Diffie-Hellman akan digunakan untuk membuat kunci-kunci pada coding barisan DNA. Nilai-nilai piksel pada citra digital diubah menggunakan coding DNA, penjumlahan DNA, dan penjumlahan dengan keystream yang didapat dari fungsi chaos logistik. Selain itu, lokasi piksel diubah menggunakan circular shifting dengan kunci yang didapat dari elliptic curve Diffie-Hellman dan interlave antar channel. Hasilnya didapat algoritma pada skripsi ini memiliki keamanan yang baik dalam menjaga kerahasiaan informasi citra digital.

Digital image is one of the information storage tool that used frequently now, so a scheme is needed to protect its security. In consequence, encryption algorithm of digital image that based on chaos with DNA coding and elliptic curve Diffie Hellman is designed. The result from elliptic curve Diffie Hellman will used to create keys in DNA coding. Pixel values in digital image are changed using DNA coding, DNA addition, and addition using keystream that obtained from chaos logistic map. Furthermore, pixel location is changed using circular shifting with key that obtained from elliptic curve Diffie Hellman and interleave. In the result, algorithm have a good security to protect digital image. "
Depok: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Indonesia, 2018
S-Pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Seberry, Jennifer, 1944-
New York: Prentice-Hall, 1989
005.8 SEB c
Buku Teks SO  Universitas Indonesia Library
cover
"Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board."
Berlin: Springer-Verlag, 2012
e20409533
eBooks  Universitas Indonesia Library
cover
Katz, Jonathan, 1974-
"ryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/​ECDSA and DHIES/​ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study."
Boca Raton: CRC Press, 2015
005.82 KAT i
Buku Teks SO  Universitas Indonesia Library
cover
Smart, Nigel P.
"In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by secure is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout.
The chapters in Part 1 offer a brief introduction to the mathematical foundations: modular arithmetic, groups, finite fields, and probability; primality testing and factoring; discrete logarithms; elliptic curves; and lattices. Part 2 of the book shows how historical ciphers were broken, thus motivating the design of modern cryptosystems since the 1960s; this part also includes a chapter on information-theoretic security. Part 3 covers the core aspects of modern cryptography: the definition of security; modern stream ciphers; block ciphers and modes of operation; hash functions, message authentication codes, and key derivation functions; the naive RSA algorithm; public key encryption and signature algorithms; cryptography based on computational complexity; and certificates, key transport and key agreement. Finally, Part 4 addresses advanced protocols, where the parties may have different or even conflicting security goals: secret sharing schemes; commitments and oblivious transfer; zero-knowledge proofs; and secure multi-party computation.
The author balances a largely non-rigorous style--many proofs are sketched only--with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and real-world documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading."
Switzerland : Springer International Publishing , 2016
e20509972
eBooks  Universitas Indonesia Library
cover
cover
Washington, Lawrence C.
Boca Raton: Chapman & Hall/CRC, 2008
516.352 WAS e
Buku Teks SO  Universitas Indonesia Library
cover
Stallings, William
London: Pearson Education, 2003
005.8 STA c
Buku Teks SO  Universitas Indonesia Library
cover
Andy Triwinarko
"DoDWAN (Document Dissemination in Wireless Ad hoc Networks) is the middle ware platform created by CASA group of the VALORIA laboratory, that support the model of communication known as "opportunistic content based" in a discontinuous mobile ad hoc networks. This platform was developed using JAVA, known for its portability features, and runs in the Linux system. The first objective of this internship is for studying and implementing the possibilities of porting DoDWAN in the Windows environment. And the second objective is for adding the feature of cryptography which can later be used to add security features to DoDWAN.

DoDWAN (Document Dissémination in Wireless Ad hoc Network) est une plateforme intergicielle qui a été créé par l?équipe CASA du laboratoire VALORIA, qui permet de supporter le modèle de communication dit "opportuniste basé contenus" dans un réseau mobile ad hoc discontinu. Cette plate forme a été développée en JAVA pour sa caractéristique de portabilité, et fonctionne sur le système Linux. Le premier objectif de ce stage est d'étudier et de mettre en oeuvre les possibilités de portage de la plate-forme intergicielle DoDWAN sur le système Windows. Le deuxième objectif est d'ajouter la fonctionnalité de chiffrement qui peut ensuite être utilisé pour ajouter des fonctionnalités de sécurité sur cette plate-forme."
Depok: Fakultas Teknik Universitas Indonesia, 2011
T29582
UI - Tesis Open  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>