Ragil Aria Dewanto
Unknown Affiliation

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

Analisis Teknik-Teknik Kriptografi Terhadap Serangan Jaringan Local Ragil Aria Dewanto; Aries Suharso
Jurnal Ilmiah Wahana Pendidikan Vol 8 No 16 (2022): Jurnal Ilmiah Wahana Pendidikan
Publisher : Peneliti.net

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.823 KB) | DOI: 10.5281/zenodo.7068003

Abstract

The purpose of this study is to find out whether a poor network topology can be a important aspect of data leakage if someone wants to steal data without the permission of an institution. The research methodology used in this study is quantitative methods and cryptographic techniques, wherein the quantitative method there are several specifications, namely structured, planned, and systematic, by performing analysis, substitution, blocking, permutation, expansion, and compression. The topology is divided into several types, namely ring topology, star topology, bus topology, tree topology, and mesh topology. In-network attacks that usually occur are spoofing, in-the-middle-attack, and sniffing. The results show that designing a local network topology using several types of topologies can make the network structure more secure. The results also show that combining a star topology and a tree topology makes the local network more secure. The results also show that combining cryptographic techniques can prevent network attacks that have been studied, especially combining blocking and permutation cryptography techniques.