Pendekatan Kriptografi Hybrid pada Keamanan Dokumen Elektronik dan HypertextTransfer Protocol Secure (HTTPS) (Analisis Potensi Implementasi Pada Sistem Keamanan)
Main Article Content
Abstract
Security issue always to be challenge for the development of information technology. As the security aspects of information systems, both of electronic and document data in hypertext data communications, must be able to meet safety standards. The implementation of security systems calssified as two methods, Symmetric and Asymmetric. Implementation of these methods certainly have their advantages and disadvantages of each, so it is necessary to apply a method to merge some types of the methods. This project was analyzed using a hybrid approach of cryptographic methods that are implemented on the security of electronic documents and Hypertext Transfer Protocol Secure (HTTPS). In the implementation of electronic document used of biometric signatures and DSA (Digital Signature Algorithm) and implementation on HTTPS used a combination of asymmetric cryptography and symmetric cryptography. The analysis of this research translated into the implementation of hybrid method on electronic documents and Hypertext Transfer Protocol Secure. From the analysis shows that the hybrid method is able to combine the advantages of symmetric and asymmetric methods, although of course the constraints in implementation complexity of the system will be even greater.
Downloads
Article Details
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
Kurniawan, Ashadi., Yuliana, Mike., Hadi, M.Zen Samsono. Analisa dan Implementasi Sistem Keamanan Data dengan menggunakan Metode Enkripsi Algoritma RC-5. Karya tidak diterbitkan. Surabaya : Institut Teknologi Sepuluh Nopember.
Mantra, IGN. 2008. Desain Intruder Detection System (IDS) Sebagai Antisipasi Hacker dan Cracker di Dunia. KOMMIT. 637-645.
Munandar, Aris., Purnama, Sigit. Analisis hybrid Cryptosystem pada Hypertext Transfer Protocol Secure (HTTPS). Karya tidak diterbitkan. Bogor : Sekolah Tinggi Sandi Negara.
Munawar. 2012. Perancangan Algoritma Sistem Keamanan Data Menggunakan Metode Kriptografi Asimetris. KOMPUTA. Vol I : 11-17.
Rosmala, Dewi. 2012. Implementasi Aplikasi Website E-Commerce Batik Sunda dengan Menggunakan Protokol Secure Socket Layer (SSL). JURNAL INFORMATIKA. No. 3. Vol. 3.
Soohyun, oh., Kwak, Jin., Won, Dongho. 2003. An Efficient Hybrid Cryptosystem Providing Authentication for Sender’s Identity. ICOIN 20013, LNCS 2662. Pp. 737-747.
Wahyuni, Ana. 2011. Aplikasi Kriptografi untuk Pengamanan e-Dokumen dengan Metode Hybrid : Biometrik Tandatangan dan DSA (Digital Signature Algorithm). Karya tidak diterbitkan. Semarang : Universitas Diponegoro.