Você está na página 1de 8

DAFTAR ISI

RINGKASAN ..............................................................................................
SUMMARY .................................................................................................
KATA PENGANTAR ..................................................................................
DAFTAR ISI ...............................................................................................
DAFTAR TABEL ........................................................................................
DAFTAR GAMBAR ....................................................................................
DAFTAR ALGORITMA ..............................................................................

iv
v
vi
vii
ix
x
xiv

PENDAHULUAN .................................................................................
1.1 Latar Belakang ..............................................................................
1.2 Rumusan Masalah ........................................................................
1.3 Batasan Masalah ..........................................................................
1.4 Tujuan Penelitian ..........................................................................
1.5 Manfaat Penelitian ........................................................................

1
1
2
3
3
4

II

LANDASAN TEORI .............................................................................


2.1 Tinjauan Pustaka ..........................................................................
2.2 Dasar Teori ...................................................................................
2.2.1 Kriptografi ..........................................................................
2.2.2 Kriptografi Vigenere Cipher ..............................................
2.2.2.1 Enkripsi Vigenere Cipher ....................................
2.2.2.2 Dekripsi Vigenere Cipher ....................................
2.2.3 Kriptografi ElGamal ...........................................................
2.2.3.1 Public Key Creation ............................................
2.2.3.2 Enkripsi ElGamal ................................................
2.2.3.3 Dekripsi ElGamal ................................................
2.2.3.4 Teorema Fast Powering .....................................
2.2.3.5 Teorema Fermat .................................................
2.2.4 Entropy ..............................................................................
2.2.5 Citra Dijital .........................................................................
2.2.6 Pseudocode ......................................................................
2.2.7 Data Flow Diagram Context Level (Diagram Konteks) ....
2.2.8 Data Flow Diagram Levelled .............................................

5
5
7
8
11
13
16
18
19
20
20
21
23
25
27
28
30
31

III KERANGKA KONSEP PENELITIAN ..................................................


3.1 Kerangka Teori .............................................................................
3.2 Variabel Penelitian ........................................................................
3.3 Hipotesis .......................................................................................

34
34
37
37

IV METODE PENELITIAN .......................................................................


4.1 Tahapan Penelitian .......................................................................
4.2 Waktu dan Tempat .......................................................................
4.3 Bahan dan Alat .............................................................................

38
38
45
45

47
47
47
51

PERANCANGAN DAN IMPLEMENTASI ............................................


5.1 Analisa Teori .................................................................................
5.1.1 Triple Vigenere Cipher ......................................................
5.1.2 Kriptografi ElGamal ...........................................................

5.1.3 Kriptografi Gabungan (ETV) .............................................


5.1.4 Analisa Pengujian Citra .....................................................
5.1.5 Analisa Pengujian Entropi .................................................
Perancangan Perangkat Lunak ....................................................
5.2.1 Diagram Konteks ...............................................................
5.2.2 Data Flow Diagram Level 1 ..............................................
5.2.3 Data Flow Diagram Level 2 Eksekusi Pilihan User...........
5.2.4 Arsitektur Sistem ...............................................................
Perancangan User Interface .........................................................
Implementasi Perangkat Lunak ....................................................
5.4.1 Implementasi Proses Enkripsi Vigenere ...........................
5.4.2 Implementasi Proses Dekripsi Vigenere ..........................
5.4.3 Implementasi Proses Enkripsi Triple Vigenere ................
5.4.4 Implementasi Proses Dekripsi Triple Vigenere ................
5.4.5 Implementasi Proses ElGamal Key Generator ................
5.4.6 Implementasi Proses Enkripsi ElGamal ...........................
5.4.7 Implementasi Proses Dekripsi ElGamal ...........................
5.4.8 Implementasi Proses ETV Key Generator .......................
5.4.9 Implementasi Proses Enkripsi ETV ..................................
5.4.10Implementasi Proses Dekripsi ETV ..................................
5.4.11Implementasi Proses Pengujian Citra ..............................
5.4.12Implementasi Proses Entropi ............................................

55
59
59
60
60
61
62
64
65
66
66
68
70
73
76
78
80
82
85
87
91
92

VI PENGUJIAN DAN ANALISIS PERANGKAT LUNAK ........................


6.1 Pengujian Proses Enkripsi Vigenere ............................................
6.2 Pengujian Proses Dekripsi Vigenere ............................................
6.3 Pengujian Proses Enkripsi Triple Vigenere ..................................
6.4 Pengujian Proses Dekripsi Triple Vigenere ..................................
6.5 Pengujian Proses ElGamal Key Generator ..................................
6.6 Pengujian Proses Enkripsi ElGamal .............................................
6.7 Pengujian Proses Dekripsi ElGamal ............................................
6.8 Pengujian Proses ETV Key Generator..........................................
6.9 Pengujian Proses Enkripsi ETV ...................................................
6.10 Pengujian Proses Dekripsi ETV ...................................................

95
99
103
108
112
118
122
127
132
137
143

VII PENUTUP ...........................................................................................


7.1 Kesimpulan ...................................................................................
7.2 Saran .............................................................................................

164
164
166

DAFTAR PUSTAKA ..................................................................................


LAMPIRAN

167

5.2

5.3
5.4

ii

DAFTAR TABEL

Halaman
Tabel 4.1 Proses-proses yang terjadi dalam kriptografi ElGamal .............

41

Tabel 4.2 Proses-proses yang terjadi dalam kriptografi gabungan (ETV)

43

Tabel 5.1 Tabel Vigenere yang dimodifikasi ..............................................

48

Tabel 5.2 Mode dalam kriptografi Triple Vigenere Cipher .........................

51

Tabel 5.3 Proses-proses yang terjadi dalam kriptografi ElGamal .............

52

Tabel 5.4 Proses-proses yang terjadi dalam kriptografi ElGamal .............

54

Tabel 5.5 Proses-proses yang terjadi dalam kriptografi gabungan (ETV)

56

Tabel 6.1 Citra dijital yang digunakan dalam pengujian ............................

95

Tabel 6.2 Data hasil pengujian kriptografi Vigenere Cipher (295 X 200) . .

149

Tabel 6.3 Data hasil pengujian kriptografi Vigenere Cipher (800 X 600) . .

150

Tabel 6.4 Data hasil pengujian kriptografi Vigenere Cipher (1024 X 768)

151

Tabel 6.5 Data hasil pengujian kriptografi Triple Vigenere Cipher


(295 X 200) .................................................................................

152

Tabel 6.6 Data hasil pengujian kriptografi Triple Vigenere Cipher


(800 X 600) .................................................................................

154

Tabel 6.7 Data hasil pengujian kriptografi ElGamal (295 X 200) ..............

156

Tabel 6.8 Data hasil pengujian kriptografi ElGamal (800 X 600) ..............

157

Tabel 6.9 Data hasil pengujian kriptografi ETV (295 X 200) .....................

158

Tabel 6.10 Data hasil pengujian kriptografi ETV (800 X 600) .....................

162

Tabel 6.11 Waktu rata-rata setiap proses pada setiap metode ...................

163

iii

DAFTAR GAMBAR

Halaman
Gambar 2.1

Proses kriptografi kunci simetris ............................................

10

Gambar 2.2

Proses kriptografi kunci asimetris ..........................................

11

Gambar 2.3

Tabel Vigenere ......................................................................

12

Gambar 2.4

Proses enkripsi Vigenere Cipher dengan tabel Vigenere .....

14

Gambar 2.5

Proses dekripsi Vigenere Cipher dengan tabel Vigenere .....

17

Gambar 2.6

Pengambilan sebuah citra menjadi citra dijital ......................

28

Gambar 3.1

Diagram alir teoritis kerangka konsep penelitian ..................

34

Gambar 3.2

Diagram alir teknis kerangka konsep penelitian ...................

36

Gambar 4.1

Tahap-tahap pelaksanaan penelitian ....................................

39

Gambar 4.2

Proses enkripsi Triple Vigenere Cipher .................................

40

Gambar 4.3

Proses dekripsi Triple Vigenere Cipher .................................

40

Gambar 4.4

Proses pembuatan kunci publik ElGamal .............................

42

Gambar 4.5

Proses enkripsi ElGamal .......................................................

42

Gambar 4.6

Proses dekripsi ElGamal .......................................................

42

Gambar 4.7

Proses pembuatan kunci publik ETV ....................................

44

Gambar 4.8

Proses enkripsi ETV ..............................................................

44

Gambar 4.9

Proses dekripsi ETV ..............................................................

44

Gambar 5.1

Proses enkripsi Triple Vigenere Cipher .................................

48

Gambar 5.2

Proses dekripsi Triple Vigenere Cipher .................................

48

Gambar 5.3

Proses pembuatan kunci publik ElGamal .............................

53

Gambar 5.4

Proses enkripsi ElGamal .......................................................

53

Gambar 5.5

Proses dekripsi ElGamal .......................................................

53

Gambar 5.6

Proses pembuatan kunci publik ETV ....................................

58

Gambar 5.7

Proses enkripsi ETV ..............................................................

58

Gambar 5.8

Proses dekripsi ETV ..............................................................

58

Gambar 5.9

Konteks diagram program aplikasi kriptografi .......................

60

Gambar 5.10 Data flow diagram level 1 ......................................................

61

Gambar 5.11 Data flow diagram level 2 Eksekusi Pilihan User ..................

62

Gambar 5.12 Gambar arsitektur program aplikasi kriptografi .....................

65

Gambar 5.13 Tampilan program aplikasi ....................................................

66

Gambar 5.14 Implementasi enkripsi Vigenere Cipher ................................

67

iv

Gambar 5.15 Implementasi dekripsi Vigenere Cipher ................................

69

Gambar 5.16 Implementasi enkripsi Triple Vigenere Cipher ......................

71

Gambar 5.17 Implementasi dekripsi Triple Vigenere Cipher ......................

74

Gambar 5.18 Implementasi ElGamal key generator ...................................

77

Gambar 5.19 Implementasi enkripsi ElGamal .............................................

79

Gambar 5.20 Implementasi dekripsi ElGamal .............................................

81

Gambar 5.21 Implementasi ETV key generator ..........................................

83

Gambar 5.22 Implementasi enkripsi ETV ....................................................

86

Gambar 5.23 Implementasi dekripsi ETV ....................................................

88

Gambar 5.24 Implementasi pengujian citra .................................................

91

Gambar 5.25 Implementasi proses entropi .................................................

93

Gambar 6.1

Pengujian enkripsi Vigenere Cipher ......................................

100

Gambar 6.2

Hasil enkripsi Vigenere Cipher ..............................................

100

Gambar 6.3

Sampling piksel kuda.bmp .....................................................

101

Gambar 6.4

Sampling piksel nemo.bmp ...................................................

101

Gambar 6.5

Sampling piksel hasil enkripsi Vigenere Cipher ....................

101

Gambar 6.6

Perhitungan entropi cipherimage Vigenere Cipher ...............

103

Gambar 6.7

Pengujian dekripsi Vigenere Cipher ......................................

104

Gambar 6.8

Hasil dekripsi Vigenere Cipher ..............................................

104

Gambar 6.9

Sampling piksel cipherimage Vigenere Cipher .....................

105

Gambar 6.10 Sampling piksel nemo.bmp ...................................................

105

Gambar 6.11 Sampling piksel hasil dekripsi Vigenere Cipher ....................

105

Gambar 6.12 Sampling piksel kuda.bmp .....................................................

106

Gambar 6.13 Sampling piksel hasil dekripsi Vigenere Cipher ....................

107

Gambar 6.14 Pengujian kesamaan citra Vigenere Cipher ..........................

107

Gambar 6.15 Pengujian enkripsi Triple Vigenere Cipher ............................

108

Gambar 6.16 Hasil enkripsi Triple Vigenere Cipher ....................................

109

Gambar 6.17 Sampling piksel kuda.bmp .....................................................

109

Gambar 6.18 Sampling piksel nemo.bmp ...................................................

110

Gambar 6.19 Sampling piksel elephant.bmp ..............................................

110

Gambar 6.20 Sampling piksel shark.bmp ....................................................

110

Gambar 6.21 Sampling piksel hasil enkripsi Triple Vigenere Cipher ..........

111

Gambar 6.22 Perhitungan entropi cipherimage Triple Vigenere Cipher .....

112

Gambar 6.23 Pengujian dekripsi Triple Vigenere Cipher ............................

113

Gambar 6.24 Hasil dekripsi Triple Vigenere Cipher ....................................

113

Gambar 6.25 Sampling piksel cipherimage Triple Vigenere Cipher ...........

114

Gambar 6.26 Sampling piksel nemo.bmp ...................................................

114

Gambar 6.27 Sampling piksel elephant.bmp ..............................................

114

Gambar 6.28 Sampling piksel shark.bmp ....................................................

115

Gambar 6.29 Sampling piksel hasil dekripsi Triple Vigenere Cipher ..........

115

Gambar 6.30 Sampling piksel kuda.bmp .....................................................

116

Gambar 6.31 Sampling piksel hasil dekripsi Triple Vigenere Cipher ..........

117

Gambar 6.32 Pengujian kesamaan citra Triple Vigenere Cipher ...............

117

Gambar 6.33 Pengujian pembuatan kunci publik ElGamal ........................

118

Gambar 6.34 Hasil pembuatan kunci publik ElGamal .................................

119

Gambar 6.35 Sampling piksel kuda.bmp .....................................................

119

Gambar 6.36 Sampling piksel nemo.bmp ...................................................

120

Gambar 6.37 Sampling piksel kunci publik ElGamal ..................................

120

Gambar 6.38 Perhitungan entropi kunci publik ElGamal ............................

121

Gambar 6.39 Pengujian enkripsi ElGamal ..................................................

122

Gambar 6.40 Hasil Enkripsi ElGamal ..........................................................

123

Gambar 6.41 Sampling piksel elephant.bmp ..............................................

123

Gambar 6.42 Sampling piksel kunci publik ElGamal ..................................

124

Gambar 6.43 Sampling piksel nemo.bmp ...................................................

124

Gambar 6.44 Sampling piksel cipherimage 1 ElGamal ...............................

124

Gambar 6.45 Sampling piksel cipherimage 2 ElGamal ...............................

125

Gambar 6.46 Perhitungan entropi cipherimage 1 ElGamal ........................

126

Gambar 6.47 Perhitungan entropi cipherimage 2 ElGamal ........................

127

Gambar 6.48 Pengujian dekripsi ElGamal ..................................................

128

Gambar 6.49 Hasil dekripsi ElGamal ..........................................................

128

Gambar 6.50 Sampling piksel cipherimage 1 ElGamal ...............................

129

Gambar 6.51 Sampling piksel cipherimage 2 ElGamal ...............................

129

Gambar 6.52 Sampling piksel kuda.bmp .....................................................

129

Gambar 6.53 Sampling piksel hasil dekripsi ElGamal ................................

130

Gambar 6.54 Sampling piksel elephant.bmp ..............................................

131

Gambar 6.55 Sampling piksel hasil dekripsi ElGamal ................................

131

Gambar 6.56 Pengujian kesamaan citra ElGamal ......................................

132

Gambar 6.57 Pengujian pembuatan kunci publik ETV ...............................

133

Gambar 6.58 Hasil pembuatan kunci publik ETV ........................................

133

Gambar 6.59 Sampling piksel kuda.bmp .....................................................

134

vi

Gambar 6.60 Sampling piksel nemo.bmp ...................................................

134

Gambar 6.61 Sampling piksel butterfly.bmp ...............................................

134

Gambar 6.62 Sampling piksel shark.bmp ....................................................

135

Gambar 6.63 Sampling piksel music.bmp ...................................................

135

Gambar 6.64 Sampling piksel kunci publik ETV .........................................

135

Gambar 6.65 Perhitungan entropi kunci publik ETV ...................................

137

Gambar 6.66 Pengujian enkripsi ETV .........................................................

138

Gambar 6.67 Hasil enkripsi ETV .................................................................

138

Gambar 6.68 Sampling piksel elephant.bmp ..............................................

139

Gambar 6.69 Sampling piksel kunci publik ETV .........................................

139

Gambar 6.70 Sampling piksel music.bmp ...................................................

139

Gambar 6.71 Sampling piksel cipherimage 1 ETV .....................................

140

Gambar 6.72 Sampling piksel cipherimage 2 ETV .....................................

140

Gambar 6.73 Perhitungan entropi cipherimage 1 ETV ...............................

142

Gambar 6.74 Perhitungan entropi cipherimage 2 ETV ...............................

142

Gambar 6.75 Pengujian dekripsi ETV .........................................................

143

Gambar 6.76 Hasil dekripsi ETV .................................................................

144

Gambar 6.77 Sampling piksel cipherimage 1 ETV .....................................

144

Gambar 6.78 Sampling piksel cipherimage 2 ETV .....................................

145

Gambar 6.79 Sampling piksel kuda.bmp .....................................................

145

Gambar 6.80 Sampling piksel nemo.bmp ...................................................

145

Gambar 6.81 Sampling piksel butterfly.bmp ...............................................

146

Gambar 6.82 Sampling piksel shark.bmp ....................................................

146

Gambar 6.83 Sampling piksel hasil dekripsi ETV .......................................

146

Gambar 6.84 Sampling piksel elephant.bmp ..............................................

148

Gambar 6.85 Sampling piksel hasil dekripsi ETV .......................................

148

Gambar 6.86 Pengujian kesamaan citra ETV .............................................

149

vii

DAFTAR ALGORITMA

Halaman
Algoritma 2.1

Algoritma fast powering........................................................

23

Algoritma 5.1

Pseudocode algoritma function envigenere .......................

67

Algoritma 5.2

Pseudocode algoritma enkripsi Vigenere Cipher ...............

68

Algoritma 5.3

Pseudocode algoritma function devigenere .......................

69

Algoritma 5.4

Pseudocode algoritma dekripsi Vigenere Cipher ...............

70

Algoritma 5.5

Pseudocode algoritma enkripsi Triple Vigenere Cipher .....

73

Algoritma 5.6

Pseudocode algoritma dekripsi Triple Vigenere Cipher .....

76

Algoritma 5.7

Pseudocode algoritma Fast Powering ................................

77

Algoritma 5.8

Pseudocode algoritma pembuatan kunci publik ElGamal . .

78

Algoritma 5.9

Pseudocode algoritma enkripsi ElGamal ............................

80

Algoritma 5.10 Pseudocode algoritma dekripsi Vigenere Cipher ...............

82

Algoritma 5.11 Pseudocode algoritma pembuatan kunci publik ETV .........

85

Algoritma 5.12 Pseudocode algoritma enkripsi ETV ...................................

87

Algoritma 5.13 Pseudocode algoritma dekripsi ETV ...................................

91

Algoritma 5.14 Pseudocode algoritma pengujian citra ................................

92

Algoritma 5.15 Pseudocode algoritma penghitungan entropi .....................

94

viii

Você também pode gostar