10
IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) PADA SISTEM APLIKASI FILE TRANSFER BERBASIS WEB : AUTHENTICATION / OTENTIKASI TUGAS AKHIR Disusun Oleh : Oktafiandi Mahardika Saputro 201310150511004 JURUSAN ELEKTRO - DIPLOMA III FAKULTAS TEKNIK UNIVERSITAS MUHAMMADIYAH MALANG 2016

IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST –

SHAMIR – ADLEMAN ) PADA SISTEM APLIKASI FILE

TRANSFER BERBASIS WEB : AUTHENTICATION /

OTENTIKASI

TUGAS AKHIR

Disusun Oleh :

Oktafiandi Mahardika Saputro

201310150511004

JURUSAN ELEKTRO - DIPLOMA III

FAKULTAS TEKNIK

UNIVERSITAS MUHAMMADIYAH MALANG

2016

Page 2: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION
Page 3: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

KATA PENGANTAR

Dengan memanjatkan puji syukur kehadirat Allah SWT. Atas limpahan rahmat

dan hidayah-NYA sehingga peneliti dapat menyelesaikan tugas akhir yang berjudul :

“IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST – SHAMIR – ADLEMAN

) PADA SISTEM APLIKASI FILE TRANSFER BERBASIS WEB :

AUTHENTICATION / OTENTIKASI”

Di dalam tulisan ini disajikan pokok – pokok bahasan yang meliputi :

Perancangan sistem, implementasi sistem dan pengujian sistem.

Peneliti menyadari sepenuhnya bahwa dalam penulisan tugas akhir ini masih

banyak kekurangan dan keterbatasan. Oleh karena itu peneliti mengharapkan saran

yang membangun agar tulisan ini bermanfaat bagi perkembangan ilmu pengetahuan

kedepan.

Malang, 17 Januari 2017

Penulis

Page 4: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

DAFTAR ISI

COVER ......................................................................................................................... i

LEMBAR PERSETUJUAN......................................................................................... ii

LEMBAR PENGESAHAN ........................................................................................ iii

LEMBAR PERNYATAAN ........................................................................................ iv

ABSTRAK ................................................................................................................... v

KATA PENGANTAR ............................................................................................... vii

DAFTAR ISI ............................................................................................................. viii

DAFTAR GAMBAR .................................................................................................. xi

DAFTAR TABEL ...................................................................................................... xii

BAB I PENDAHULUAN ............................................................................................ 1

1.1 Latar Belakang ............................................................................................... 1

1.2 Rumusan Masalah .......................................................................................... 2

1.3 Tujuan ............................................................................................................ 2

1.4 Batasan Masalah ............................................................................................ 3

1.5 Metodologi ..................................................................................................... 3

1.6 Sistematika Penulisan .................................................................................... 3

BAB II LANDASAN TEORI ...................................................................................... 5

2.1 Web ............................................................................................................... 5

2.2 Ubuntu ........................................................................................................... 5

2.3 Web Server .................................................................................................... 6

2.3.1 Apache.................................................................................................. 6

2.3.2 Nginx .................................................................................................... 6

2.4 PHP ( Personal Home Page ) ........................................................................ 7

2.5 MySQL ( My Sctructured Query Language ) ............................................... 8

Page 5: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

2.6 Pengertian Keamanan.................................................................................... 8

2.7 Pengertian Autentikasi .................................................................................. 9

2.8 Isms API ( Application Programming Interface ) ....................................... 10

2.9 Definisi Kriptografi ..................................................................................... 11

2.9.1. Pengertian ......................................................................................... 11

2.9.1.1 Pengiriman dan Penerimaan ................................................ 11

2.9.1.2 Pesan, Plaintext, dan Chipertext.......................................... 11

2.9.1.3 Enkripsi dan Dekripsi .......................................................... 12

2.9.1.4 Algoritma Kriptografi dan Kunci ........................................ 13

2.9.1.5 Sistem Kriptografi ............................................................... 13

2.9.1.6 Penyadap ............................................................................. 13

2.9.1.8 Tujuan Kriptografi .............................................................. 13

2.9.2 Konsep Matematis Kriptografi ........................................................ 14

2.10 Algoritma RSA ......................................................................................... 15

2.10.1 Tinjauan Umum ............................................................................ 15

2.10.2 Properti Algortima RSA ............................................................... 16

2.10.3 Perumusan Algoritma RSA .......................................................... 16

2.10.4 Algoritma Membangkitkan Pasangan Kunci ............................... 18

2.10.5 Algoritma Enkripsi dan Deskripsi ................................................ 20

2.10.5.1 Enkripsi .......................................................................... 20

2.10.5.2 Deskripsi ....................................................................... 20

BAB III ANALISA DAN PERANCANGAN SISTEM ............................................ 22

3.1 Pendahuluan ................................................................................................ 22

3.1.1 Diagram Konteks (context diagram) .................................................. 23

3.2 Identifikasi Hubungan (connection) antara Sistem dan Pemakai (user) ..... 24

3.2.1 Diagram Use - Case ........................................................................... 25

Page 6: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

3.2.2 Dokumentasi Use - Case .................................................................... 25

3.2.3 Diagram Kelas (class diagram) ......................................................... 26

3.2.4 Statechart Flowchart........................................................................... 27

3.3 Perancangan dan Implementasi ................................................................... 29

3.3.1 Perencanaan dan Implementasi Flowchart ......................................... 31

3.4 Register ....................................................................................................... 30

3.5 Hasil Akhir Perencanaan ............................................................................. 31

BAB IV IMPLEMENTASI DAN PENGUJIAN ...................................................... 33

4.1 Implementasi Konfigurasi Pada Proses Keamanan Login .......................... 33

4.1.1 Instalasi Server Web ......................................................................... 33

4.1.2 Instalasi Program ............................................................................... 33

4.1.3 Konfigurasi Program ......................................................................... 35

4.1.3.1 Konfigurasi User Database .................................................... 36

4.1.3.2 Pengujian Proses Generate Key ............................................. 37

4.1.4 Database menggunakan MySQL ....................................................... 49

4.2 Implementasi Penggunaan Web File Transfer ............................................ 50

4.2.1 Tampilan Halaman Utama ................................................................. 51

4.2.2 Tampilan Login .................................................................................. 51

4.2.3 Tampilan Pendaftaran ........................................................................ 52

4.2.4 Tampilan Verifikasi ........................................................................... 52

4.2.4.1 Penerimaan Melalui SMS ...................................................... 53

4.2.4.2 Penerimaan Melalui Email ..................................................... 54

4.2.5 Tampilan Awal Utama ....................................................................... 54

BAB V PENUTUP ................................................................................................... 56

5.1 Kesimpulan ................................................................................................. 56

5.2 Saran ............................................................................................................ 56

Page 7: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

DAFTAR PUSTAKA ................................................................................................ 57

LAMPIRAN ............................................................................................................... 58

Page 8: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

DAFTAR GAMBAR

Halaman

Gambar 2.1 Proses Enkripsi dan Dekripsi ................................................................. 14

Gambar 2.2 Proses Enkripsi dan Dekripsi dengan Kunci .......................................... 17

Gambar 3.1 Diagram Konteks antara User, Local Server dengan iSMS Server........ 25

Gambar 3.2 Diagram Use – Case antara User, Local Server dan iSMS Server ......... 27

Gambar 3.3 Diagram Use – Case Local Server ......................................................... 29

Gambar 3.4 Kelas (class) yang Membentuk Sistem Keamanan ................................ 28

Gambar 3.5 Flowchart Proses Masuk ke Dalam Halaman Web ................................ 30

Gambar 3.6 Flowchart Pendaftaran............................................................................ 31

Gambar 3.7 Flowchart Login ..................................................................................... 31

Gambar 3.8 Flowchart Verifikasi ............................................................................... 32

Gambar 3.9 Flowchart Penerimaan Kode .................................................................. 32

Gambar 4.1 Tampilan File Dalam Hosting ................................................................ 36

Gambar 4.2 Tampilan Directory Di Dalam Hosting .................................................. 36

Gambar 4.3 Tampilan Database ................................................................................. 51

Gambar 4.4 Tampilan Halaman Utama ..................................................................... 52

Gambar 4.5 Tampilan Login ...................................................................................... 52

Gambar 4.6 Pengujian Pendaftaran ............................................................................ 53

Gambar 4.7 Pengujian Verifikasi ............................................................................... 54

Gambar 4.8 Tampilan Penerimaan Kode Melalui SMS............................................. 55

Gambar 4.9 Tampilan Penerimaan Kode Melalui Email ........................................... 55

Gambar 4.10 Tampilan Menu Utama......................................................................... 55

Page 9: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

DAFTAR TABEL

Tabel 3.1 Jenis interaksi antara pengguna dan server ........................................ 26

Tabel 3.2 Use-case description untuk pengguna ( user ) .................................... 28

Tabel 3.3 Use-case description untuk server....................................................... 28

Page 10: IMPLEMENTASI KRIPTOGRAFI RSA ( RIVEST SHAMIR ADLEMAN ) …eprints.umm.ac.id/35661/1/jiptummpp-gdl-oktafiandi-49093... · 2017. 11. 13. · TRANSFER BERBASIS WEB : AUTHENTICATION

DAFTAR PUSTAKA

[1] Khairina Marisa Dyna 2011. Analisis Keamanan Sistem Login : 6

[2] Riankostans.wordpress – komunikasi data

[3] Munir. 2004

[4] proweb – web design

[5] linux – what is linux

[6] whatis techtarget – definition web server

[7] apache

[8] php – intro whatis php

[9] hastomo – pengertian dan kelebihan database mysql

[10] M. Abrams and P. Brusil. 2000; Computer Security Journal : 2

[11] Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P.,

Luotonen, A., and Stewart, L. 1999. HTTP Authentication: Basic and Digest

Access Authentication.

[12] isms - Pengertian iSMS API