Perancangan program simulasi pengiriman pesan menggunakan algoritma kriptografi rsa dan interlock protocol = The design of message sending simulation program using rsa cryptography algorithm and interlock protocol

Kusumo, Timothy Nova (2010) Perancangan program simulasi pengiriman pesan menggunakan algoritma kriptografi rsa dan interlock protocol = The design of message sending simulation program using rsa cryptography algorithm and interlock protocol. Bachelor thesis, Universitas Pelita Harapan.

[thumbnail of Title]
Preview
Text (Title)
Cover.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (19kB) | Preview
[thumbnail of Abstract]
Preview
Text (Abstract)
Abstract.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (99kB) | Preview
[thumbnail of TOC]
Preview
Text (TOC)
TOC.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (121kB) | Preview
[thumbnail of Chapter 1]
Preview
Text (Chapter 1)
Chapter 1.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (192kB) | Preview
[thumbnail of Chapter 2] Text (Chapter 2)
Chapter 2.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (770kB)
[thumbnail of Chapter 3] Text (Chapter 3)
Chapter 3.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (785kB)
[thumbnail of Chapter 4] Text (Chapter 4)
Chapter 4.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (2MB)
[thumbnail of Chapter 5] Text (Chapter 5)
Chapter 5.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (72kB)
[thumbnail of Bibliography]
Preview
Text (Bibliography)
Bibliography.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (126kB) | Preview
[thumbnail of Appendices] Text (Appendices)
Appendices.pdf
Restricted to Repository staff only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (3MB)

Abstract

As the technology era starts to grow larger and internet becoming a lifestyle, more people starts to use it without realizing that the data sent through the internet might be taken by unauthorized person. The intruder might look what’s inside the data or modify it. This person is called man in the middle (MITM). This scenario could take place even when it’s encrypted, for example using RSA algorithm as one of the most secure encryption these days. Moreover, many people don’t know how to overcome MITM by the use of the interlock protocol, which has been introduced twenty six years ago. In this final project, a simulation program has been successfully made to help people, understand about RSA, MITM attack and interlock protocol. It starts by making keys for RSA algorithm, later the program will show how MITM works and the use of interlock protocol, where the message is divided into two parts and sent simultaneously. Each part of the message can be decrypted but it will be unreadable. The simulation program runs perfectly, as long as the input from the user does not exceed the rule of using the program. The RSA algorithm used in this program is a bit different with the real RSA, where the user had to determine the values of p, q, and e for making the keys. This program can be improved by adding other encryption algorithms or creating better animation for the simulation.
Item Type: Thesis (Bachelor)
Creators:
Creators
NIM
Email
ORCID
Kusumo, Timothy Nova
NIM08320050015
UNSPECIFIED
UNSPECIFIED
Contributors:
Contribution
Contributors
NIDN/NIDK
Email
Thesis advisor
Hardjono, Benny
NIDN0404086401
benny.hardjono@uph.edu
Thesis advisor
Aribowo, Arnold
NIDN0304057602
arnold.aribowo@uph.edu
Additional Information: SK 83-05 KUS p ; T 71389
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7885-7895 Computer engineering. Computer hardware
Divisions: University Subject > Historic > Faculty/School > Computer System Engineering
Historic > Faculty/School > Computer System Engineering
Depositing User: Christine Natalia Nababan
Date Deposited: 27 Apr 2021 08:37
Last Modified: 06 Nov 2024 08:06
URI: http://repository.uph.edu/id/eprint/29615

Actions (login required)

View Item
View Item