Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 32

1

2
3
4
Enkripsi
E

5
6
7
Contoh Steganography (1)

8
 Tiga buah telegram ditujukan kepada seorang hakim asal Amerika yang
sedang berada diMoskow. Pertanyaan: MENGAPA si hakim tsb kemudian
ditangkap oleh KGB?
1. NEXT JUDICIARY COUNCIL MEETING CAN NOW BE
ARRANGED. CONFIRM CONVENIENT DATE AS SPACE MUST BE
REQUESTED. BORIS.
2. ADVISE PROBLEM TRAVEL PLANS.YOUR SISTER'S PLANE
ARRIVED LATE BUT LANDED SAFELY. LOST PASSPORT AND
MONEY. SHE WILL BE PLACED IN FIRST-CLASS SWISS HOTEL.
WILL SETTLE ACCOUNT LATER. BORIS.
3. YOUR SISTER WILL TRY AMERICAN EMBASSY TO OBTAIN
TEMPORARY PASSPORT. NO INFORMATION AVAILABLE YET ON
NEW VISA SWISS MAKE RUSSIANS SEEM SAINTS. WILL SHIP
SISTER TO YOU SOONEST. BORIS.
9
10
Enkripsi:

11
Enkripsi:

14
16
19
21
 01-Cesar Chiper
 02-Polyalphabetical Chiper (Vignere Chiper)
 03-One Time Padding

22
24
The input to the round is Input Left Half Input Right Half
divided in half

Roundkey
The right half is put into a
round function with the
roundkey
Round
The output of the round
Function
function is XORed with the
left half

The two halves switch


sides to become the input
to the next round

Only the left half of the


input has been modified Output Left Half Output Right Half
Plaintext Block Feistel ciphers need twice as many
rounds as SPN ciphers because only
Roundkey 1
half of the input is being encrypted
Round 1 each round

Works the same as SPN ciphers in


Roundkey 2 terms of transforming one key into
Round 2 subkeys and splitting the plaintext
into blocks

Roundkey 3 To decrypt, the ciphertext is sent


through the same cipher and the
Round 3
roundkeys are used in reverse order

Ciphertext Block
Input to the round

First, the input is XORed with


the round subkey

Second, the input is split into


pieces (usually of one byte)
and put through a substitution

Finally, the pieces are


swapped around

Output from the round


And the output from this
round becomes the input to
the next round
Plaintext Block
The overall plaintext is broken
Roundkey 1 into blocks and each block is
encrypted with the cipher
Round 1

Typical SPN ciphers will have 10-


Roundkey 2
14 rounds

Round 2 Alice and Bob only need one key,


and the cipher will transform that
key into subkeys for each round
Roundkey 3

To decrypt, Alice just does


Round 3 everything in the reverse order

Ciphertext Block
 Follow SPN/Feistel structure in general, but with
added twists for security

 There are two important ciphers in the history of


modern cryptography
› DES (Data Encryption Standard)
› AES (Advanced Encryption Standard)

You might also like