DAFTAR ISI
Halaman
DAFTAR ISI........................................................................................................ iv
DAFTAR GAMBAR........................................................................................... vi
BAB 1 : PENDAHULUAN................................................................................. 1
1.1 Latar Belakang .................................................................................... 1
1.2
Perumusan Masalah.............................................................................. 2
1.3
Batasan Masalah................................................................................... 2
1.4
Tujuan dan Manfaat Penelitian............................................................. 2
1.4.1
Tujuan.......................................................................................... 2
1.4.2 Manfaat........................................................................................ 3
BAB 2 : KAJIAN PUSTAKA............................................................................. 4
2.1 Extensible Markup Language (XML)................................................... 5
2.2 Three Tier.............................................................................................. 7
2.2.1
Database Layer............................................................................ 8
2.2.2
Service Layer............................................................................... 9
2.2.3
Client Layer................................................................................. 9
2.3
Kriptograf............................................................................................. 9 2.3.1 Advace Encryption Standard (AES).................................................................................. 10
2.3.1.1 Operasi.......................................................................... 11
2.3.1.2 Transformasi Subtitusi Byte.......................................... 11
2.3.1.3 Transformasi Pergeseran Baris...................................... 14
2.3.1.4 Transformasi Percampuran Kolom................................ 15
2.3.1.5 Transformasi Penambahan Kunci.................................. 17
2.3.2 Vigenere Chiper......................................................................... 18
2.3.3 Algoritma RC4........................................................................... 22
2.3.4 Metode multi Enkripsi................................................................ 26
2.3.4.1
Autentifikasi Pengguna.................................................. 27
2.3.4.2
Pemilihan Metode Enkripsi............................................ 27
2.3.4.3
Penentuan Kunci............................................................ 28
2.3.4.4
Proses Enkripsi............................................................... 29
2.3.4.5
Proses Deskripsi XML................................................... 30
2.4 SMS Gateway....................................................................................... 31
2.4.1 Komunikasi Melalui COM Port................................................. 32
2.4.2 AT Command............................................................................. 32
2.4.3 Mengirim SMS dengan SMS Gateway...................................... 33
BAB 3 : METODE PENELITIAN...................................................................... 36
3.1
Activity Diagram................................................................................. 36
3.2
Squence Diagram................................................................................. 37
3.2.1 Daftar User................................................................................. 38
3.2.2 User Login.................................................................................. 39
3.2.3 Random Enkripsi........................................................................ 39
3.2.4 Pengiriman Kunci....................................................................... 40
3.2.5 Deskripsi..................................................................................... 41
3.3 Class Diagram...................................................................................... 41
3.3.1 Class Pendaftaran User............................................................... 42
3.3.2 Class Login................................................................................. 42
3.3.3 Class Random Enkripsi............................................................... 43
3.3.4 Class Pengiriman Kunci.............................................................. 44
3.3.5 Class Deskripsi............................................................................ 44
3.4 Rancangan Algoritma.......................................................................... 45
3.4.1 Algoritma generate Kunci........................................................... 45
3.4.2 Algoritma Random Enkripsi....................................................... 46
3.5 Jadwal Kegiatan................................................................................... 47
DAFTAR PUSTAKA........................................................................................... 48
0 komentar:
Posting Komentar