Perkuliahan 13 ( 24 - 27 November 2020 )
Mata Kuliah : Keamanan Sistem Komputer (C31040319)
INSTITUT TEKNOLOGI PLN
JURUSAN TEKNIK INFORMATIKA
SEMESTER GANJIL - TAHUN AJARAN 2020/2021
KEAMANAN SISTEM KOMPUTER (C31040319)
KELAS F
Desi Rose Hertina, S.T,. M.KOM
FADHILAH PUSPITASARI
201931053
PONTIANAK, KALIMANTAN BARAT
Perkuliahan 13
Kriptografi Vignere Cipher
Kriptografi Vignere Chipher adalah metode menyandikan teks alfabet dengan menggunakan deretan sandi Caesar berdasarkan huruf-huruf pada kata kunci. Sandi Vigenere Cipher merupakan bentuk sederhana dari sandi substitusi polialfabetik. Kelebihan sandi ini dibanding sandi Caesar dan sandi monoalfabetik lainnya adalah sandi ini tidak begitu rentan terhadap metode pemecahan sandi yang disebut analisis frekuensi.
TUGAS
VIGNERE CIPHER, berdasarkan penjelasan contoh dari cara kerja Algoritma VIGNERE
CIPHER, sebagai berikut:
a. Carilah cipher text berdasarkan proses Enkripsi,
b. Pesan “SUMPAH PEMUDA”, KUNCI=KEJUJURAN
c. Lakukan pengembalian pesan dengan proses Deskripsi.
JAWAB
Diketahui : Pesan "SUMPAH PEMUDA", KUNCI = KEJUJURAN
Syarat Algoritma
Kriptografi Vignere Cipher yaitu :
- Jumlah alfabet kunci mengikuti jumlah alfabet pesan.
- Pesan disimpan pada BARIS pada table acuan.
- Kunci disimpan pada KOLOM pada table acuan.
Berikut ini adalah table acuan untuk Algoritma Kriptografi Vignere Cipher dalam bentuk matrik sebanyak 26 baris x 26 kolom.
Tabel Acuan
|
Pesan |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
A |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
|
B |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
|
C |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
|
D |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
|
E |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
|
F |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
|
G |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
|
H |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
|
I |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
|
J |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
|
K |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
|
L |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
|
M |
M |
N |
O |
P |
G |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
|
N |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
|
O |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
|
P |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
|
Q |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
|
R |
R |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
|
S |
S |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
|
T |
T |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
|
U |
U |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
|
V |
V |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
|
W |
W |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
|
X |
X |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
|
Y |
Y |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
|
Z |
Z |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
|
KUNCI |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Pesan (Baris) |
S |
U |
M |
P |
A |
H |
P |
E |
M |
U |
D |
A |
|
Kunci (Kolom) |
K |
E |
J |
U |
J |
U |
R |
A |
N |
K |
E |
J |
|
Enkripsi (Baris, Kolom) |
(S, K) = C |
(U, E) = Y |
(M, J) = V |
(P, U) = J |
(A, J) = J |
(H, U) = B |
(P, R) = G |
(E, A) = E |
(M, N) = Z |
(U, K) = E |
(D, E) = H |
(A, J) = J |
|
Enkripsi Tahapan |
Tempatkan HURUF PESAN pada ruang BARIS, kemudian cari HURUF KUNCI pada ruang KOLOM, sehingga titik temu (ISI) antara BARIS dan KOLOM dari setiap huruf adalah cipher text. |
|||||||||||
|
Cipher Text |
CYVJJB GEZEHJ |
|||||||||||
|
Deskripsi (Chipher, Kunci) |
S |
U |
M |
P |
A |
H |
P |
E |
M |
U |
D |
A |
|
Deskripsi Tahapan |
Berdasarkan HURUF cipher text yang berada di titik ISI tabel acuan carilah HURUF KUNCI pada bagian KOLOM sejajar, sehingga HURUF PESAN dapat ditemukan pada bagian BARIS sejajar |
|||||||||||
|
Plain Text |
SUMPAH PEMUDA |
|||||||||||
Nah itu dia jawaban dari Algoritma Kriptografi Vignere Cipher, sekian dan terimakasihh😊
Link Keamanan Sistem Komputer Kelas F :
Emil Setiawan (201831196) https://kumpulantugas337426035.wordpress.com/
Muhammad Rafly S (201831187) mraflysyahputra.wordpress.com
Miko Caesar (201831061) https://miko-caesar-201831061-ksk-f.blogspot.com/?m=1
Salsabila Ghaisani (201931116) https://salsabillaghaisani.blogspot.com
Dila Hepitia (201831066) https://dilahepitiasttpln.blogspot.com/?m=1
Kevin (201831163) https://bit.ly/35XoUtS
Dhea Putri Erra Pradina (201831179) https://dheaputri15.blogspot.com/
Nur Intan Pratiwi (201931115) https://nurintanpratiwi114.blogspot.com/
Dwi Putri (201931123) https://dwiputri3007.blogspot.com/
Sasha Amalia (201831093) https://itscaacha.blogspot.com/
Putri Olivia Nababan (201831167) https://putriolivianababan.blogspot.com/?m=1
Rayhan (201831164) http://elrayhan.blogspot.com/
Yoghie Vernando Sinaga (201831184) https://yogivs.blogspot.com/?m=1
Miftaul Jatzia Semi (201831119) https://informatikasatuuu.blogspot.com/?m=1
Ufairah Abidah (201931037) https://ufairahhabidahh.blogspot.com/
Daffa Alvaro (201931101) https://daffa1931101.blogspot.com/
Muhammad Iqbal Saleh (201931117) https://muhammadiqbalsaleh.blogspot.com/
A Ahrifaeni (201831193) https://kskfahrifaeni.blogspot.com/
Muhammad Rafly Sulthan Erran (201831162) https://rafiyerran.wordpress.com/
Rezky Fajri (201831016) https://kskfajrirezky.blogspot.com/?m=1
Dinda Felicia (201931040) https://keamanansistemkomputer1.blogspot.com/?m=1
Thifal Indriyani (201931051) https://keamanansistemkomputer.data.blog/?s=
Fadhilah Puspitasari (201931053) https://fadhilahpuspitasari.blogspot.com/?m=1
Faradilla Setyarini (201931045) https://faradillasetyaar.blogspot.com/?m=1
Sahat Gohi Tua (201831101) https://kskitpln.blogspot.com/2020/09/hi_21.html?m=1
Siti Aisyah Ramadhana (201931215) https://sitiaisyahramadhana.blogspot.com/?m=1
Maryo Freddy (201731275) https://bit.ly/2ZYxmFv
Ni Kadek Winda Christy Febriani (201931011) https://nikadekwinda027.blogspot.com/?m=1
Yolanda Sundari (201931114) https://keamanansistemkomputer-yolandasundari.blogspot.com/?m=1
Muh Fauzi Badaruddin (201731115) https://securitymycomputer.blogspot.com/
Regita I. Pangestu (201831102) https://winterlavender315773555.wordpress.com/
Andi Nur Ainun Putri U. (201831069) https://keamanansistemkomputer.wordpress.com/
Muhammad Furqan Mushady (201831059) https://furqanmushady.blogspot.com/
Yafi Irfan Zuhdi (201831094) https://yafiirfan.wordpress.com/
Muhammad Sabri Fadhil (201831142) https://perkenalankskitpln.blogspot.com/
Yoan Arsyika (201931203) https://yoanask24.blogspot.com/2020/09/keamanan-sistem-komputer.html

Komentar
Posting Komentar