Cryptography || Tugas Akhir Praktikum Keamanan Sistem Informasi || Arbian Alex Pritama

Arbian Pratama
10 May 202412:24

Summary

TLDRIn this educational video, the presenter introduces the concepts of cryptography, detailing both classical and modern methods. Classical techniques like Caesar and Vigenère ciphers are briefly mentioned, while modern cryptography is split into symmetric (RC4, DES) and asymmetric (RSA, DSA) types. The tutorial focuses on a practical demonstration, guiding viewers through the installation of Apache and setting up a PHP script for encryption and decryption. The script includes form handling, text processing, and saving encrypted data to a file, showcasing the encryption and decryption process in action.

Takeaways

  • 🔐 The video introduces the concept of cryptography, which is the study and practice of securing messages.
  • 🔑 It distinguishes between two types of cryptography: classical and modern cryptography.
  • 📜 Classical cryptography includes methods like Caesar cipher, transposition cipher, and others.
  • 💡 Modern cryptography is divided into symmetric and asymmetric cryptography, with algorithms such as RC4, DES, AES, IDEA for symmetric, and RSA, DSA, and ECC for asymmetric.
  • 🛠️ The video demonstrates the installation and setup of a cryptographic tool, likely a web-based application, by installing packages and restarting services.
  • 🌐 It provides a walkthrough of accessing the tool's interface through a web browser by navigating to a specific IP address.
  • 📝 The script explains the process of encryption using a form in 'awal.php', which takes user input and processes it through 'nkiser.php'.
  • 🔢 It details the encryption process, which involves converting text to decimal, performing encryption, and then converting the result back to ASCII.
  • 📝 The encrypted text is then saved to a file named 'enkripsi.txt', which is accessible and modifiable with specific permissions.
  • 🔄 The video also covers the decryption process in 'akhir.php', which involves reading the encrypted file, decrypting it, and displaying the original message.
  • 🔒 The importance of matching encryption and decryption keys ('q' value) is emphasized for successful decryption.

Q & A

  • What is cryptography?

    -Cryptography is the science and art of securing messages.

  • What are the two types of cryptography mentioned in the script?

    -The two types of cryptography mentioned are classical cryptography and modern cryptography.

  • Can you name some examples of classical cryptography techniques?

    -Examples of classical cryptography techniques include Caesar cipher, fine cipher, and Vigenère cipher.

  • What is the difference between symmetric and asymmetric cryptography?

    -In symmetric cryptography, the same key is used for both encryption and decryption, while in asymmetric cryptography, two different keys are used – a public key for encryption and a private key for decryption.

  • Which algorithms are mentioned in the script for symmetric cryptography?

    -The script mentions RC4 and DES as examples of symmetric cryptography algorithms.

  • What does the script say about the installation process of a package?

    -The script describes installing a package using 'apt-get install' and then restarting the service with 'service apache2 restart'.

  • How does the script explain the encryption process in the 'awal.php' file?

    -The 'awal.php' file contains a form for encryption, which takes user input and processes it through a series of steps including converting text to decimal, encrypting it, and then converting it back to ASCII.

  • What is the purpose of the 'enkripsi.txt' file mentioned in the script?

    -The 'enkripsi.txt' file is used to store the encrypted output of the encryption process.

  • How does the script describe the decryption process in the 'akhir.php' file?

    -The 'akhir.php' file is responsible for decryption, where it retrieves the key from 'enkripsi.txt', reads the encrypted data, and performs the decryption process by reversing the steps used in encryption.

  • What is the significance of the 'q' value in the encryption and decryption process as described in the script?

    -The 'q' value is significant as it is used in the encryption and decryption process to modify the text. It must be the same in both processes to ensure the original message can be correctly decrypted.

  • How does the script guide users to view the results of the encryption and decryption processes?

    -The script guides users to view the results by accessing the 'awal.php' and 'akhir.php' files through a web browser and entering the necessary inputs to see the original and encrypted/decrypted messages.

Outlines

00:00

🔐 Introduction to Cryptography

The speaker begins by introducing themselves and then proceeds to explain the concept of cryptography, which is the science and art of securing messages. They differentiate between classical and modern cryptography, mentioning techniques such as Caesar cipher, fine cipher, and the Vigenère cipher as examples of classical methods. Modern cryptography is further divided into symmetric and asymmetric cryptography, with examples including RC4, DES, AES, IDEA, and asymmetric algorithms like RSA, DSA, and ECC. The speaker then transitions into a practical demonstration, discussing the installation of Apache and the configuration of a server environment, which involves restarting Apache and checking the IP address. They also mention the files involved in the encryption process, such as 'awal.php', 'dkxr', 'nkxr', and 'enkripsi.html', and describe the initial steps in setting up the encryption interface.

05:01

💻 Practical Encryption Process

In this section, the speaker delves into the practical aspects of the encryption process. They discuss the handling of plaintext and the transformation of characters into decimal form. The process involves encryption algorithms that manipulate the decimal values and convert them back into ASCII characters. The speaker explains the use of a loop to iterate over the plaintext, encrypting it, and then storing the encrypted data in a file named 'enkripsi.txt'. They also touch upon the decryption process, where the encrypted text is converted back into its original form using a key. The speaker guides through the steps of setting up a web interface to input text and view the encrypted output, and they mention the importance of file permissions when modifying and executing scripts.

10:01

🔑 Decryption and Conclusion

The final paragraph focuses on the decryption process, where the encrypted text is converted back into its original form. The speaker explains the steps involved in decrypting the text, including converting ASCII back to decimal and then using the key to reverse the encryption process. They mention the importance of using the same key for decryption as was used for encryption. The speaker concludes by summarizing the key points discussed in the video and thanks the viewers for their attention. They end with a religious blessing and a sign-off, indicating the end of the video tutorial.

Mindmap

Keywords

💡Cryptography

Cryptography is the practice and study of techniques for secure communication in the presence of adversaries. In the context of the video, it is the central theme, with the speaker discussing both classical and modern forms of cryptography. The video aims to educate viewers on how to secure messages using cryptographic methods, highlighting its importance in digital communication.

💡Classical Cryptography

Classical cryptography refers to older methods of encryption that were used before the advent of modern computer systems. Examples include the Caesar cipher and the Vigenère cipher. The video mentions these as part of the historical background, contrasting them with modern cryptographic techniques to show the evolution of the field.

💡Modern Cryptography

Modern cryptography involves more complex algorithms and techniques that are used in contemporary digital systems. The video discusses two main types: symmetric and asymmetric cryptography. It's a key concept as it represents the current state of secure communication, with the video providing examples of algorithms like RC4, DES, and AES in symmetric cryptography, and RSA and DSA in asymmetric cryptography.

💡Symmetric Cryptography

Symmetric cryptography is a method of encryption where the same key is used for both encryption and decryption. The video explains that symmetric algorithms like RC4 and DES are faster but require secure key exchange mechanisms. It's crucial for understanding how data is protected in many of today's systems where speed is a priority.

💡Asymmetric Cryptography

Asymmetric cryptography, also known as public-key cryptography, uses a pair of keys, one public and one private. The video touches on algorithms like RSA and DSA, emphasizing the importance of key distribution and the security benefits of this method, such as its use in digital signatures and secure key exchanges.

💡Encryption

Encryption is the process of converting information into a code to prevent unauthorized access. The video script describes a practical example of encryption where a form is used to take user input, which is then encrypted using a certain algorithm. This process is fundamental to the video's demonstration of how to secure messages.

💡Decryption

Decryption is the reverse process of encryption, converting coded information back into its original form. The video script includes a section on 'akhir.php', which is about decryption, showing how the encrypted message is converted back to the original text using the appropriate key. This is essential for understanding the full cycle of secure communication.

💡Key

In cryptography, a key is a piece of information that determines the functional output of a cryptographic algorithm. The video script mentions the use of a key in both encryption and decryption processes. The concept of the key is central to understanding how the security of messages is maintained and how access is controlled.

💡ASCII

ASCII (American Standard Code for Information Interchange) is a character encoding standard for electronic communication. The video script refers to ASCII in the context of converting characters to their decimal ASCII values as part of the encryption process. Understanding ASCII is important for grasping how text is represented and manipulated in digital systems.

💡PHP

PHP (Hypertext Preprocessor) is a server scripting language used to create dynamic web pages. The video script includes mentions of '.php' files, indicating the use of PHP for implementing the cryptographic functions on a web server. PHP is relevant as it demonstrates how web applications can handle encryption and decryption processes.

💡IP Address

An IP address is a unique identifier for devices on a network. The video script mentions checking the IP address, which is necessary for accessing the web server where the cryptographic functions are hosted. Understanding IP addresses is fundamental to networking and accessing services on the internet.

Highlights

Introduction to cryptography as the science and art of securing messages.

Differentiation between classical and modern cryptography.

Explanation of classical cryptography methods such as Caesar cipher and Vigenère cipher.

Division of modern cryptography into symmetric and asymmetric cryptography.

Mention of RC4, DES, and IDEA as examples of symmetric cryptography algorithms.

Description of asymmetric cryptography algorithms including RSA, DSA, and ECC.

Instructions on installing and using a specific cryptographic application.

Details on restarting the application to apply changes.

Explanation of how to check the IP address for the application.

Demonstration of accessing and modifying 'awal.php' for encryption interface.

Description of the form in 'awal.php' for text encryption.

Explanation of the process to convert text to decimal for encryption.

Details on encrypting the decimal form and converting it back to ASCII.

Process of saving the encrypted data to an 'enkripsi.txt' file.

Instructions on accessing the encrypted data through a web browser.

Demonstration of entering text and key to see the encryption result.

Description of modifying file permissions to allow reading, editing, and execution.

Explanation of the 'akhir.php' process for decryption.

Details on how the decryption process retrieves the key and encrypted data for decryption.

Description of converting the encrypted ASCII back to the original text.

Final thoughts and conclusion of the presentation with a thank you note.

Transcripts

play00:05

baik asalamualaikum warahmatullahi

play00:06

wabarakatuh perkenalkan nama saya ar

play00:08

alitama eh dengan mm

play00:11

25506113 jadi pada video kali ini saya

play00:14

akan menjelaskan tentang kriptografi eh

play00:18

kriptografi sendiri adalah ilmu dan seni

play00:21

untuk menjaga keamanan pesan jadi

play00:23

terdapat dua jenis kriptografi yaitu ada

play00:26

kriptografi klasik dan kriptografi

play00:28

modern kriptografi klasik sendiri

play00:31

terdiri dari Caesar chiper fine chiper

play00:34

kemudian ada visioner chiper dan

play00:36

lain-lain Ki untuk yang kriptografi

play00:38

modern sendiri menjadi eh terbagi

play00:40

menjadi dua yaitu simetrik dan

play00:43

asimetrik yang simetriknya itu terdapat

play00:46

RC rc4 kemudian ada di DS kemudian

play00:53

Eis kemudian idea Kemudian pada eh

play00:57

asimetri sendiri ada

play01:00

a kemudian eh dsa eh DS kemudian

play01:06

ada

play01:09

g g kemudian

play01:13

eh kita lanjutkan pada percobaan jadi e

play01:16

pada percobaan kali ini kita e yang

play01:19

pertama-tama harus kita lakukan adalah

play01:22

menginstal dari

play01:24

apacya jadi berhubung di sini saya sudah

play01:27

menginstalnya kita akansung ke

play01:31

ee ke perintah ini jadi kita akan masuk

play01:35

ke

play01:44

EC petisi kemudian Nah kita masuk ke etc

play01:48

ini di kemudian ap 2 restart jadi kita

play01:51

di sini akan me-restart kembali APAC 2

play01:54

kita nah jika rest sudah berhasil kita

play01:58

eh Exit dulu

play02:01

kita lihat untuk eh ininya

play02:04

ip-nya Nah di

play02:07

sini kita butuh IP Nah di sini ada IP

play02:12

defaultnya yaitu

play02:15

10021 kita akan cek dulu untuk IP

play02:18

address-nya di sini kita akan cek

play02:27

10.0 Nah di sini ee eh

play02:32

jika jika apa c2nya sudah direstart dan

play02:35

sudah berhasil dipasang dia akan e

play02:38

menampilkan beberapa file dari Ininya

play02:40

tadi Dari dari com PRnya ini jadi di

play02:44

sini kita masuk

play02:46

dulu

play02:50

ke masuk

play02:58

ked SL www Nah di sini kita LS Nah di

play03:04

sini eh terdapat beberapa file yaitu

play03:08

awal eh Akhir akhir akhir kemudian ada

play03:11

awal ada dkxr ada nkxr kemudian ada

play03:14

enkripsi ada

play03:17

html ini kita akan memodifikasi

play03:21

untuk kita CL dulu kita akan melihat

play03:25

untuk yang pertama dulu Jadi kita akan

play03:28

ee melihat untuk eh

play03:33

awal.php-nya Nah pada

play03:35

awal.php di sini yang pertama itu adalah

play03:38

form untuk enkripsi jadi eh untuk

play03:42

awal.php ini adalah untuk interface dari

play03:45

form untuk

play03:47

enkripsi kemudian

play03:49

eh dia akan mengambil aksi dari

play03:52

nkiser.php ini nah kemudian di sini eh

play03:55

terdapat t yang dia akan menginputkan

play03:58

teks yang berupa kata-kata jadi

play04:00

kata-kata ya bukan huruf kemudian di

play04:03

sini dia akan

play04:04

ee membuat Q juga q-nya ini bertipe teks

play04:10

dan eh name-nya sendiri itu adalah ke

play04:12

jadi di sini ke-nya itu berupa angka

play04:15

yang eh maxnya itu adalah du jadi

play04:19

maksimalnya itu adalah dua angka jadi

play04:21

tidak bisa t tiga angka seperti 100 1000

play04:24

itu tidak bisa jadi maksimal angknya

play04:26

adalah 99 Nah di sini juga ada eh value

play04:31

untuk kirim E dan ulangi di sini

play04:34

masing-masing yaitu kirim itu submit

play04:36

Kemudian untuk reset itu ulangi J kita

play04:39

nanti akan e langsung ke ininya saja

play04:42

jadi kita jelasin dulu kemudian untuk

play04:45

yang selanjutnya itu kita akan masuk ke

play04:48

niser.php kita akan masuk ke

play04:55

[Musik]

play05:00

nah pada nphp ini dia akan mengambil e

play05:04

kalimat e kata ini sebagai kalimatnya

play05:07

kemudian itu dia akan mengambilnya dan

play05:10

kemudian di sini ada

play05:12

perulangan pada baris selanjutnya ini

play05:15

baris untuk

play05:17

mengubahnya ke bentuk desimal nah

play05:20

kemudian selanjutnya ini dia akan

play05:24

memprosesinyaah kalau prosespi itunya

play05:28

inian berbeda dengan deskripsi yang

play05:30

deskripsi yang eh q-nya nanti akan

play05:32

dikurang nah kemudian selanjutnya adalah

play05:35

mengubah desimal ke Asci jadi ini kan

play05:38

SCI ke desimal kemudian dia akan

play05:40

melakukan proses enkripsi dan kemudian

play05:42

mengubahnya dari desimal ke SCI

play05:45

lagi sini ee dia akan mengeluarkan

play05:49

kalimat asli dari perulangan eh

play05:52

perulangan ini perulangan kalimatnya ini

play05:54

kemudian ee hasil enkrips ini juga akan

play05:58

ee di ditampilkan dari perurangan for

play06:02

ini kemudian dia akan menyimpan datanya

play06:05

di

play06:06

encripsi.xt tadi enripsi.txt

play06:12

iniah sama saja Kemudian

play06:17

eh kita akan masuk ke enripsi doekinnya

play06:21

nanti nanti setelah kita masuk ke

play06:26

ininya browsernya kita coba eh untuk web

play06:30

browsernya sendiri Kita akan masuk ke

play06:34

102015 kemudian

play06:38

awalp Nah di sini untuk web browsernya

play06:42

sendiri Eh sudah tampil yaitu Plex dan

play06:44

key-nya jadi plnya ini kita akan membuat

play06:47

Seperti contohnya Kal saja

play06:52

k kemudian ke-nya ini Kita masukin

play06:57

l kita kirim n Maka hasilnya akan

play07:00

seperti ini kalimat aslinya adalah

play07:01

kalimat kemudian hasil enkripsinya

play07:03

adalah PF eh pfq NRP nah seperti ini

play07:08

kemudian kita akan cek ke eh enkripsi

play07:12

ini encripsi.x-nya nanti jadi kita masuk

play07:16

ke

play07:19

nanoripsi

play07:21

txt nah dapat dilihat di sini proses

play07:24

enkripsinya akan disimpan di sini di eh

play07:28

enripsi.

play07:30

tadi

play07:32

Nah jadi jika kita belum membuat proses

play07:35

E enp ini kita akan e buat

play07:42

dulu ini hanya sebagai contoh nah jika

play07:47

sudah kita kosongkan saja kita terlebih

play07:49

dahulu dan kembalikan sini kalau kita LS

play07:53

dia akan

play07:55

menilkan ini nah yang di mana untuk

play08:00

file enkpsi.xnya ini itu belum di eh

play08:04

diubah jadi dia masih hanya doang jadi

play08:09

di sini kita akan mengubah menggunakan

play08:11

CH

play08:13

mod CH

play08:23

777 Nah di sini jika sudah kita ubah ke

play08:26

77 ini 77 ini Adah bertanda di akan ee

play08:31

bisa membaca kemudian bisa mengedit dan

play08:34

mengeksekusinya dia antara grup user dan

play08:38

ers-nya dia bisa

play08:39

semua nah jika sudah kita akan langsung

play08:42

ke

play08:43

ee berikutnya yaitu

play08:47

akhir.php kita masuk ke

play08:55

akhir.php Nah di sini ee akhir.php Ini

play08:59

adalah

play09:00

untukkripsi nah yang di mana ehnya itu

play09:04

adal mengambil file dari

play09:07

e ini kemudian dia akan

play09:10

meng

play09:13

dan mengut jadi tidak adanya

play09:18

tadi membuatnya saja yang di mana

play09:21

seperti yang tadi

play09:24

itunya

play09:26

iniuk

play09:28

yang tadi n Kisar itu dia terdapat plnya

play09:32

tapi untuk yang deisarnya ini

play09:35

tidak ke sudah kita akan masuk

play09:39

ke Nano eh

play09:45

dksr Nah di sini eh untuk DK sendiri

play09:49

atau proses deskripsinya ini dia akan e

play09:52

mengambil key dari

play09:54

enkpsi tadi jadi dia akan mengambil eh

play09:57

data data yang disimpan di enps. nanti

play10:01

dan kemudian dia akan membuka file hasil

play10:03

enkripsinya dan yang di

play10:06

mana dia

play10:08

akan untuk

play10:13

dariyaadi Kemudian untuk yang

play10:15

selanjutnya ini terdapat perulangan juga

play10:18

di sini Untuk Untuk bar selanjutnya ini

play10:21

ada mengubah hasil dari SCI

play10:24

keah kemudi UNT yang selanjutnya ini

play10:26

pros

play10:28

deskpi enkripsi tadi sudah saya jelaskan

play10:31

yaitu dia akan dikurang dari q-nya ini

play10:34

berbeda dengan enkripsi yang ditambah

play10:36

dia kudan untuk yang selanjutnya adalah

play10:38

mengubah desimal ke S nah kemudi di sini

play10:42

e dia akan menampilkan

play10:45

kalimatipernya dari perulangan

play10:47

ini nah kemudian hasil deskripsinya ini

play10:51

melalui perulangan

play10:55

ini jika sudah kita

play10:58

akan bya itu dari

play11:02

ee Ini

play11:04

tadi kita ubah

play11:10

ke

play11:11

PHP nah di mana Eh untuk proses

play11:15

dekripsinya tadi q-nya ini harus sama

play11:18

dengan proses dari enkripsinya yang di

play11:20

mana pada enkripsi tadi saya memasukkan

play11:23

q-nya itu adalah 5 jadi kita akan

play11:25

memasukkan di sini 5 J harus sama tidak

play11:28

boleh beda

play11:30

nah dia akan e mengeluarkan eh dari

play11:34

kalimatiper tnya ini e proses

play11:37

enkripsinya dari yang pertama tadi

play11:39

kemudian menjadi hasil deskripsinyau

play11:41

kalimat sama seperti proses enkripsi P

play11:44

pertama kali tadi jadi

play11:47

kalimat kalimat asli dari yang enkripsi

play11:50

tadi adalah kalimat kemudian dia akanp

play11:57

menjadiah kemud untuk yang EE

play11:59

deskripsinya dia akan menyampaikan

play12:01

chiper teksnya tadi yaitu proses hasil

play12:03

dari enkripsinya kemudian akan diubah

play12:06

menjadi hasil deskripsi menjadi kalimat

play12:08

asli yaitu kalimat

play12:10

mungkin ee cukup itu yang saya e

play12:14

sampaikan kurang dan lebihnya saya mohon

play12:16

maaf saya akhiri wasalamualaikum

play12:18

warahmatullahi wabarakatuh Terima kasih

Rate This

5.0 / 5 (0 votes)

Related Tags
CryptographyEncryptionSecurityCipherPHPTutorialCodingWeb SecurityData ProtectionEncryption Techniques