PERANCANGAN DAN IMPLEMENTASI PERANGKAT LUNAK PROXY TUNNEL DENGAN ENKRIPSI KUNCI SIMETRISASIMETRIS UNTUK MANIPULASI PAKET DATA
Abstract
Abstracts: The authors conducted a study on wiretapping in computer networks because of it is very disturbing security and comfort in the surf. Therefore the writer create a proxy tunnel software with symmetric and asymmetric encryption as a security agent that encrypts data communications conducted. Forms of research that the author did was experimental data collection techniques onegroup posttest-pretest, the authors study variable is the security of data packets transmitted between website and browser. Design method used is the Extreme Programming with 4 ways to apply the practical development of XP, namely coding, testing, listening and designing. The result is a software design software called "Crypto Tunnel Proxy", according to the function of encryption, tunneling and proxy. The software engineering author uses Visual Basic 6.0 and uses 2 types of encryption, namely symmetrical and asymmetrical. The authors also apply the hash function as a fingerprint or fingerptint of keys that are sent. This application can improve security in computer networks. By encrypting all data packets between the browser and the website are symmetrical and asymmetrical. Tests conducted with several commonly used browsers.
Keywords: RC4 and RSA Encryptiom, Tunneling, Proxy
Keywords
Full Text:
PDFReferences
Ariyus, Dony., 2008, Pengantar Ilmu Kriptografi, Andi Offset, Yogyakarta.
Beck, Kent., 1999, Extreme Programming Explained: Embrace Change, AddisonWesley
Brenton, Chris., Hunt, Cameron., 2003, Network Security, Diterjemahkan oleh : Jhoni
Hidayat. Jakarta : PT. Elex Media Komputindo.
Kristianto, Andi. 2003, Keamanan Data pada Jaringan Komputer, Gava Media :
Yogyakarta
Kruse, Robert L., Tindo, Clovis L, Leung, Bruce P., 1997, Data Structure and Program
Design in C, Second Edition, USA : Prentice Hall International.
Stiawan, Deris., 2005, Sistem Keamanan Komputer, Jakarta: PT. Elex Media
Komputindo
Syafrizal, Melwin., 2005, Pengantar Jaringan Komputer, Yogyakarta: Andi.
DOI: http://dx.doi.org/10.30700/jst.v1i1.3
Article Metrics
Abstract view : 271 timesPDF - 330 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2015 SISFOTENIKA
Badan Pengelola Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (SISFOTENIKA) STMIK Pontianak.
Jurnal Ilmiah SISFOTENIKA terindex di :
| |
SERTIFIKAT PENGHARGAAN :
Jurnal Ilmiah SISFOTENIKA Terakreditasi Peringkat Empat
Partners & Co-Organizers:
Jurnal Ilmiah SISFOTENIKA: STMIK Pontianak Online Journal ISSN Printed (2087-7897) - ISSN Online (2460-5344) licensed under a Lisensi Creative Commons Atribusi 4.0 Internasional.