PERANCANGAN DAN IMPLEMENTASI PERANGKAT LUNAK PROXY TUNNEL DENGAN ENKRIPSI KUNCI SIMETRISASIMETRIS UNTUK MANIPULASI PAKET DATA

Gat Gat

Abstract


Abstracts: The authors conducted a study on wiretapping in computer networks because of it is very disturbing security and comfort in the surf. Therefore the writer create a proxy tunnel software with symmetric and asymmetric encryption as a security agent that encrypts data communications conducted. Forms of research that the author did was experimental data collection techniques onegroup posttest-pretest, the authors study variable is the security of data packets transmitted between website and browser. Design method used is the Extreme Programming with 4 ways to apply the practical development of XP, namely coding, testing, listening and designing. The result is a software design software called "Crypto Tunnel Proxy", according to the function of encryption, tunneling and proxy. The software engineering author uses Visual Basic 6.0 and uses 2 types of encryption, namely symmetrical and asymmetrical. The authors also apply the hash function as a fingerprint or fingerptint of keys that are sent. This application can improve security in computer networks. By encrypting all data packets between the browser and the website are symmetrical and asymmetrical. Tests conducted with several commonly used browsers.


Keywords: RC4 and RSA Encryptiom, Tunneling, Proxy

 


Keywords


RC4 and RSA Encryptiom; Tunneling; Proxy;

Full Text:

PDF

References


Ariyus, Dony., 2008, Pengantar Ilmu Kriptografi, Andi Offset, Yogyakarta.

Beck, Kent., 1999, Extreme Programming Explained: Embrace Change, AddisonWesley

Brenton, Chris., Hunt, Cameron., 2003, Network Security, Diterjemahkan oleh : Jhoni

Hidayat. Jakarta : PT. Elex Media Komputindo.

Kristianto, Andi. 2003, Keamanan Data pada Jaringan Komputer, Gava Media :

Yogyakarta

Kruse, Robert L., Tindo, Clovis L, Leung, Bruce P., 1997, Data Structure and Program

Design in C, Second Edition, USA : Prentice Hall International.

Stiawan, Deris., 2005, Sistem Keamanan Komputer, Jakarta: PT. Elex Media

Komputindo

Syafrizal, Melwin., 2005, Pengantar Jaringan Komputer, Yogyakarta: Andi.




DOI: http://dx.doi.org/10.30700/jst.v1i1.3

Article Metrics

Abstract view : 247 times
PDF - 317 times

Refbacks

  • There are currently no refbacks.


Copyright (c) 2015 SISFOTENIKA

Badan Pengelola Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (SISFOTENIKA) STMIK Pontianak.

 

Jurnal Ilmiah SISFOTENIKA terindex di :


   

   

  

    

    

    

   

 

 

 

ISSN Printed : 2087-7897

ISSN Online : 2460-5344


SERTIFIKAT PENGHARGAAN :

Jurnal Ilmiah SISFOTENIKA Terakreditasi Peringkat Empat

 

Partners & Co-Organizers:




Lisensi Creative Commons

Jurnal Ilmiah SISFOTENIKA: STMIK Pontianak Online Journal ISSN Printed (2087-7897) - ISSN Online (2460-5344) licensed under a Lisensi Creative Commons Atribusi 4.0 Internasional. Flag Counter

View My Stats>