Pengamanan Komputer Menggunakan Kriptografi CIPHER BLOCK CHAINING (CBC)

Alcianno G. Gani

Sari


In cryptography, a mode of operation is an algorithm that uses a block cipher to encrypt messages of arbitrary length in a way that provides confidentiality or authenticity. A block cipher by itself is only suitable for the secure cryptographic transformation (encryption or decryption) of one fixedlength group of bits called a block. A mode of operation describes how to repeatedly apply a cipher's single-block operation to securely transform amounts of data larger than a block.
Most modes require a unique binary sequence, often called an Initialization Vector (IV), for each encryption operation. The IV has to be non-repeating and, for some modes, random as well. The initialization vector is used to ensure distinct ciphertexts are produced even when the same plaintext is encrypted multiple times independently with the same key. Block ciphers have one or more block size(s), but during transformation the block size is always fixed. Block cipher modes operate on whole blocks and require that the last part of the data be padded to a full block if it is smaller than the current block size. There are, however, modes that do not require padding because they effectively use a block cipher as a stream cipher; such ciphers are capable of encrypting arbitrarily long sequences of bytes or bits.
Historically, encryption modes have been studied extensively in regard to their error propagation properties under various scenarios of data modification. Later development regarded integrity protection as an entirely separate cryptographic goal. Some modern modes of operation combine confidentiality and authenticity in an efficient way, and are known as authenticated encryption modes.


Teks Lengkap:

PDF

Referensi


Setiawan Agung, Pengantar Sistem Komputer Edisi Revisi, Informatika, Bandung, 2005.

Bosworth Seymor, Kebay M. E : Computer Security Handbook 4ed, John Wiley & Sons 2002

Check Point Software Technologies: Principles of Network Security, Check Point Software Technologies 2003

Kaye Doug, Loosely Coupled : Missing Pieces of Web Services, RDS Press 2003

Skillsoft Press: Cryptography Protocols and Algorithms, Skillsoft press 2003

Menga Justin, Timm Carl: CCSP: Secure Intrusion Detection and SAFE Implementation Study Guide, Sybex 2004.

Howard Michael: Designing Secure Web-Bases Applications for Microsoft Windows 2000, Microsoft Press 2000

ITU-T: Compendium of Approved ITUT Security Definitions, edition 2003 February, ITU 2003

Peuhkuri Markus: Lecture Material: Securing the Network and Information, 2004

Nguyen Hung Q., Johnson Bob, Hackett Michael: Testing Applications on the Web: Test Planning for Mobile and Internet-Based System 2nd Edition, John Wiley & Sons 2003

Russell Ryan et al., Stealing the Network: How to Own the Box, Syngress Publishing 2003

Koconis David, Murray Jim, Purvis Jos, Wassom Darrin: Securing Linux: A Survival Guide for Linux Security, SANS Institute 2003

Erickson Jon: Hacking: The Art of Exploitation, No Starch Press 2003

Mirza Ahmad David R. Et al.: Hack Proofing Your Network, 2nd Edition, Syngress Publishing 2002

Wang Wallace: Steal This Computer Book 3: What They Won't Tell You About the Internet No Starch Press 2003

Preethan V. V.:Internet Security and Firewalls Premier Press 2002

Brenton Chris, Hunt Cameron: Mastering Network Security 2nd Edition, Sybex 2003

Litlejohn Shinder, Debra : Scene of The Cybercrime - Computer Forensic handbook, Syngress Publishing 2003

Crayton Christopher A.: The Security+ Exam Guide: TestTakers Guide Series. Charles River Media 2003

Schmied Will et al.:MCSE/MCSA Implementing & Administering Security in a Windows 2000 Network Study Guide, Syngress Publising 2003

Kevin Mitnick: The Art of Deception, John Wiley & Sons 2003

Shimonski Robert J. Et al.: The Best Damn Firewall Book Period, Syngress Publishing 2003 Andres Steven, Kenyon Brian: Security Sage’s Guide to Hardening the

Network Infrastructure, Syngress Publishing 2004

CSI/FBI: Computer Crime and Security Survey 2004

Andress Mandy, Cox Phil, Tittel Ed (ed): CIW Security Professional Certification Bible, John Wiley & Sons 2001

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition. Bruce Schneier, John Wiley & Sons, 1997, ISBN 0-47112845-7

Crypt::CBC Module, Lincoln D. Stein, http://www.cpan.org/ authors/id/L/LD/ LDS/Crypt-CBC-1.00.readme. (diakses tanggal 15 Oktober 2015, 18.00)

http://www.drdobbs.com/webdevelopment/encryption-usingcryptcbc/184416083 (diakses tanggal 15 Oktober 2015, 17.10)

Netcraft: Site Outages for The SCO Group, http://news.netcraft.com/archives/2004/ 05/27/site_outages_for_the_sco_group .html (diakses tanggal 15 Oktober 2015, 20.00)

www.google.com[02-Keamanan_Jaringan_Komputer.pdf] (diakses tanggal 20 Oktober 2015, 20.00)

WWW.Keamanan Jaringan Komputer Tugas individurenderwork - Cara Hacker Mendapatkan Password Anda.mht] (diakses tanggal 20 Oktober 2015, 20.30)

https://en.wikipedia.org/wiki/Block_ciph er_mode_of_operation (diakses tanggal 5 November 2015, 19.15)

http://www.metode-algoritma.com/2016

/01/kriptografi-cipher-block-chainingcbc.html (diakses tanggal 25 Maret 2016, 20.45)

https://cryptobounce.wordpress.com/ta g/kriptografi-simetrik/ (diakses tanggal 25 Maret 2016, 18.38)




DOI: https://doi.org/10.35968/jsi.v3i2.65

Refbacks



Indexed by: