Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 108 dokumen yang sesuai dengan query
cover
Fakhrul Arifin
"Diawali dengan Google File System dan MapReduce dari Google, Apache mengenalkan Hadoop sebagai teknologi pengolah data yang berukuran sangat besar. Karena tujuan awal Hadoop hanya untuk mengolah data yang berukuran besar, masalah keamanan data belum diantisipasi pada Hadoop versi 1.2.1. Pada skripsi ini membahas tentang program enkripsi yang dijalankan pada Hadoop versi 1.2.1. Program mengenkripsi file teks yang ada pada Hadoop Distributed File System(HDFS) dengan cara mengenkripsi setiap kata yang ada pada file. Program menggunakan algoritma enkripsi AES dan DES. Skripsi ini juga membandingkan program enkripsi yang berjalan tanpa Hadoop, Hadoop Standalone, dan Hadoop Distributed. Pada Hadoop Distributed menggunakan dua komputer dan satu virtual komputer. Melalui percobaan, terlihat bahwa program yang berjalan tanpa Hadoop memiliki troughput 0.99 MB/s sedangkan program yang berjalan pada Hadoop Standalone dan Hadoop Distributed masing-masing sebesar 0.53 MB/s dan 0.65 MB/s.

Beginning with the Google File System and MapReduce from Google, Apache introduce Hadoop as large data processing technology. Since the initial purpose of Hadoop for large data processing, data security issues have not been anticipated in the Hadoop version 1.2.1. In this final project discusses encryption programs that run on Hadoop version 1.2.1. The program encrypts text files that exist on the Hadoop Distributed File System (HDFS) by means of encrypting every word in the file. The program uses AES and DES encryption algorithm. This final project also compare the encryption program that runs without Hadoop, Hadoop Standalone, and Distributed Hadoop. Through experiments, it appears that the program is running without Hadoop having throughput 0.99 MB/s while the program is running on Hadoop Standalone and the Hadoop Distributed respectively 0.53 MB/s and 0.65 MB/s."
Depok: Fakultas Teknik Universitas Indonesia, 2014
S56276
UI - Skripsi Membership  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control."
Berlin: Springer, 2012
e20407128
eBooks  Universitas Indonesia Library
cover
Venturi, Daniele
"Tuttavia, l’analisi di sicurezza di questi schemi crittografici (fino ai primi anni ‘80) era soprattutto guidata dall’intuito e dall’esperienza. Nuovi schemi venivano ideati e, dopo qualche tempo, inevitabilmente, un nuovo attacco alla sicurezza veniva scoperto. Il paradigma della “sicurezza dimostrabile” ha trasformato la crittografia da arte a scienza, introducendo un paradigma for male per l’analisi di sicurezza dei crittosistemi: in questo modo è possibile fornire una dimostrazione matematica che un dato sistema è sicuro rispetto ad una classe generale di attaccanti. Tanto più vasta e vicina alla realtà è que sta classe, tanto più forti sono le garanzie offerte dal crittosistema analizzato."
Milan: [Springer-Verlag, ], 2012
e20410660
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications."
Heidelberg : Springer, 2012
e20406883
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues."
Heidelberg: Springer, 2012
e20408388
eBooks  Universitas Indonesia Library
cover
Stallings, William
Boston: Pearson , 2017
005.8 STA c
Buku Teks SO  Universitas Indonesia Library
cover
Elvian Syafrurizal
"Dalam komunikasi data, dengan meningkatnya jumlah dan keparahan serangan ancaman cyber harian, enkripsi menjadi salah satu alat penting untuk memastikan keamanan data dalam perjalanan. Meskipun AES, terutama AES-256, saat  ini  dianggap  sebagai  penerus  DES  yang  dapat  memberikan  keamanan tersebut, itu tidak akan tetap menjadi status quo. Dengan kemajuan penelitian komputasi kuantum, keamanan  yang diberikan  oleh AES tidak  akan  bertahan lama. Dengan demikian, penelitian untuk enkripsi berbasis chaotic map, Chaotic Encryption Standard (CES) pada akhirnya akan menjadi kandidat prospektif untuk penerus AES. Namun demikian, metode enkripsi seperti CES tidak hanya perlu tahan terhadap upaya cracking, tetapi juga harus mempertahankan informasi yang tersimpan di dalamnya saat sedang ditransfer. Dalam percobaan ini, aliran data yang dienkripsi dalam CES, dalam hal ini CES (PCMPB/K), dibandingkan dengan yang dienkripsi dalam AES-256 dan DES. Semua dijalankan melalui simulasi NS3 dengan jaringan tidak bebas-kesalahan menggunakan UDP sebagai enkapsulasi paket. Hasil percobaan menunjukkan bahwa meskipun CES (PCMPB/K) memang lebih sulit untuk di rusak daripada AES256 dan DES, hal tersebut itu menimbulkan risiko yang lebih tinggi untuk tidak dapat dibaca dalam jaringan tidak bebas-kesalahan karena ukuran bit blok besar yaitu 16 kali dari AES-256 dan 32 kali DES.

In data communication, with increasing number and severity of day to day cyber-threat attacks, encryption becomes one of the crucial tools to ensure the security of data in transit.   Although AES, especially AES-256, currently considered as the successor of DES that can give such security, it will not remain a status quo. With the advancements of quantum computing research, the security provided by AES is not going to stand for long. Thus, the research for chaotic map-based  encryption,  Chaotic  Encryption  Standard  (CES)  will  eventually become  prospective  candidate  for  AES  successor.  Nevertheless,  encryption method like CES not only needs to be resistant to cracking effort, but it also has to retain the information held within while being transferred.   In this experiment, streams of data encrypted in CES, in this case CES(PMCS/E), is compared to the ones encrypted in AES-256 and DES. All are run through an NS3 simulation with non-error free network using UDP as packet encapsulation. The results of the experiment show that even though CES(PMCS/E) is indeed harder to crack than AES256 and DES,   it poses higher risk to be unreadable in a non-error free network due to the large block bit size which is 16 times of the AES-256 and 32 times of the DES."
Depok: Fakultas Teknik Universitas Indonesia, 2020
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Inu Laksito Wibowo
"Sistem kripto (data encryption) dengan kunci publik, mempunyai keunggulan dalam pengaturan kunci dibanding dengan sistem kripto yang konvensional. Pada sistem kripto konvensional, suatu jaringan komputer dengan n riser dibutuhkan n(n-1)2 kunci, sedangkan pada sistem kripto dengan kunci publik ini hanya dibutuhkan n kunci. Di samping mempunyai keunggulan pada pengaturan kunci, sistem kripto dengan kunci publik ini menjamin keaslian pesan yang dikirimkan oleh seorang user. Sistem kripto dengan kunci publik ini dapat pula diaplikasikan untuk pembuatan skema pemeriksaan keaslian password. Salah satu keunggulan skema pemeriksaan keaslian password dengan dasar sistem ini mampu mempertahankan keamanan sistem walaupun berkas yang berisi password-password user berhasil diketahui. Salah satu alasannya adalah derajat kesulitan untuk menurunkan password-password yang sebenarnya relatif tinggi."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 1992
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
David Pointcheval, editor
"This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012.
The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices."
Berlin: Springer-Verlag, 2012
e20406359
eBooks  Universitas Indonesia Library
cover
Goichiro Hanaoka, editor
"This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols."
Berlin: Springer-Verlag, 2012
e204063781
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>