Analisis Teknik-Teknik Kriptografi Terhadap Serangan Jaringan Local

  • Ragil Aria Dewanto Universitas Singaperbangsa Karawang
  • Aries Suharso Universitas Singaperbangsa Karawang

Abstract

The purpose of this study is to find out whether a poor network topology can be a important aspect of data leakage if someone wants to steal data without the permission of an institution. The research methodology used in this study is quantitative methods and cryptographic techniques, wherein the quantitative method there are several specifications, namely structured, planned, and systematic, by performing analysis, substitution, blocking, permutation, expansion, and compression. The topology is divided into several types, namely ring topology, star topology, bus topology, tree topology, and mesh topology. In-network attacks that usually occur are spoofing, in-the-middle-attack, and sniffing. The results show that designing a local network topology using several types of topologies can make the network structure more secure. The results also show that combining a star topology and a tree topology makes the local network more secure. The results also show that combining cryptographic techniques can prevent network attacks that have been studied, especially combining blocking and permutation cryptography techniques.

References

Basri, “Kriptografi Simetris Dan Asimetris Dalam Perspektif Keamanan Data Dan Kompleksitas Komputasi,” J. Ilm. Ilmu Komput., vol. 2, no. 2, pp. 17–23, 2016, [Online]. Available: http://ejournal.fikom-unasman.ac.id.

Hariati, K. Hardiyanti, and W. E. Putri, “Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks,” Sinkron, vol. 2, no. 2, pp. 13–17, 2018, [Online]. Available: https://jurnal.polgan.ac.id/index.php/sinkron/index.

Widodo, M. Yana, and H. Agung, “Implementasi Topologi Hybrid Untuk Pengoptimalan Aplikasi Edms Pada Project Office Pt Phe Onwj,” J. Tek. Inform., vol. 11, no. 1, pp. 19–30, 2018, doi: 10.15408/jti.v11i1.6472.

W. M. Ashari, “Perbandingan Performa Kriptografi Asimetris Pada Proses Key Exchange,” Sci. Tech J. Ilmu Pengetah. dan Teknol., vol. 6, no. 1, pp. 26–32, 2020, doi: 10.30738/jst.v6i1.6609.

M. Y. Maulana et al., “Perancangan Aplikasi Media Pembelaran,” FTIK, vol. 1, no. 1, pp. 357–367.

N. Aini, “Analisis Jaringan Local Area Network,” Prosisko, vol. 5, no. 1, 2018, doi: 10.31219/osf.io/htxwe.

J. Rahmadoni, “PERANCANGAN SIMULASI PEMBELAJARAN KRIPTOGRAFI KLASIK MENGGUNAKAN METODE WEB BASED LEARNING,” J. Inf. Technol. Comput. Sci., vol. 1, no. 1, pp. 1–25, 2018, doi: https://doi.org/10.31539/intecoms.v1i1.160.

M. Gustiawan, R. J. Yudianto, J. Pratama, and A. Fauzi, “Implementasi Jaringan Hotspot Di Perkantoran Guna Meningkatkan Keamanan Jaringan Komputer,” J. Nas. Komputasi dan Teknol. Inf., vol. 4, no. 4, pp. 244–247, 2021, doi: 10.32672/jnkti.v4i4.3098.

S. Suhandinata, R. A. Rizal, D. O. Wijaya, P. Warren, and S. Srinjiwi, “Analisis Performa Kriptografi Hybrid Algoritma Blowfish Dan Algoritma Rsa,” JURTEKSI (Jurnal Teknol. dan Sist. Informasi), vol. 6, no. 1, pp. 1–10, 2019, doi: 10.33330/jurteksi.v6i1.395.

P. S. SIANTURI, “Aplikasi Pembelajaran Kriptografi Hill Chiper Dengan Menggunakan Metode Computer Based Instruction,” JTIK (Jurnal Tek. Inform. Kaputama), vol. 3, no. 2, pp. 38–43, 2019, [Online]. Available: https://jurnal.kaputama.ac.id/index.php/JTIK/article/view/174.

M. A. Al-Shabi, “A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security,” Int. J. Sci. Res. Publ., vol. 9, no. 3, p. p8779, 2019, doi: 10.29322/ijsrp.9.03.2019.p8779.

J. Y. A. Elreesh and S. S. Abu-Naser, “Cloud Network Security Based on Biometrics Cryptography Intelligent Tutoring System,” vol. 3, no. 3, pp. 37–70, 2019, [Online]. Available: http://dstore.alazhar.edu.ps/xmlui/handle/123456789/146.

S. Althuniba, M. Chen, G. Martinez, and M. Sheng, “Publishing Editors Board of Editors,” Int. J. Electron. Inf. Eng., vol. 8, no. 2, 2018.

P. B. T. Kumbara and M. A. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Permainan Tradisional Rangku Alu,” J. Tek. Inform. dan Sist. Inf., vol. 5, no. 2, pp. 189–200, 2019, doi: 10.28932/jutisi.v5i2.1714.

W. Susanti and R. N. Putri, “Penerapan Cloud Computing Sebagai Media Pembelajaran Berbasis Online Masa Pandemi Covid-19,” JOISIE (Journal Inf. Syst. Informatics Eng., vol. 4, no. 1, p. 56, 2020, doi: 10.35145/joisie.v4i1.663.

B. Jana and J. Poray, "A performance analysis on elliptic curve cryptography in network security," 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE), 2016, pp. 1-7, doi: 10.1109/ICCECE.2016.8009587.

Published
2022-09-11
How to Cite
Dewanto, R., & Suharso, A. (2022). Analisis Teknik-Teknik Kriptografi Terhadap Serangan Jaringan Local. Jurnal Ilmiah Wahana Pendidikan, 8(16), 467-476. https://doi.org/10.5281/zenodo.7068003

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.