2 research outputs found

    Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan)

    Get PDF
    This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver). Given the assurance that the sender of the message is the sender, not a third party (eyesdropper) and received messages are genuine. Elliptic Curve Digital Signature Algorithm (ECDSA) is one method of digital signatures on Elliptic Curve Cryptography (ECC). ECC is a public-key cryptography using the Elliptic Curve Discrete Logarithm Problem (ECDLP) as the basic math. ECDLP used is Q = kP, where Q and P are the points on the elliptic curve of F2m Finite field and k is positive integers. This final project provide an email client application that integrated with ECDSA algorithm, so it can be able to provide digital signature on sent message, to verify the digital signature on a received message, and give a warning if the verification fails, which means received email was not genuine

    Implementasi algoritma kriptografi kunci publik ElGamal untuk keamanan pengiriman Email

    Get PDF
    Our current life surrounded by cryptography. Starting from the transaction at the ATM machine, a conversation through mobile phones, accessing the Internet, to enable the missile was using cryptography. Once the importance of cryptography for Information Security (Information Security), so if talk about security issues associated with computer use, it will not be separated from the cryptography. Cryptography is also used in the process of sending email. If an email is sent through the public network then the security level is very risky. Theft techniques of information from an email will increasingly from day to day. One of them is the concept of Man - In - The Middle. Use of Cryptography will help give our email information security. Although the attacker or the Man - In - The Middle managed to get the text that we send, but can not get any information obtained since the text had been encrypted before. Chipertext obtained can only be opened by the party who has a private key (decryption key). One algorithm used for encryption and discussed in this final project is the ElGamal algorithm. This algorithm emphasizes the discrete algorithm problem. With these problems then chipertext ElGamal encryption result will be very difficult to decrypted. Keyword : cryptography, email, ElGamal, Man in The Middle, public networ
    corecore