Perpustakaan judul masih dalam tahap pengembangan, admin siap menampung kritik dan saran
ANALISA DAN SIMULASI ALGORITMA KRIPTOGRAFI A5/2 UNTUK KEAMANAN KOMUNIKASI SUARA PADA JARINGAN GSM
RISMA FEBRIANTI (2007) | Skripsi | Teknik Informatika , Teknik Informatika , Teknik Informatika
Bagikan
Ringkasan
More and more the increasing of consumer amount the cellular phone of GSM make the information security which commuted for become one of aspect which important enough to be paid attention to. To take care of the secret of important data or conversation, one of its ways is by using method of cryptography. Algorithm A5 used as by method cryptography weared for the encoding of voice at system phone the cellular GSM. This Algorithm A5 divided to become the A5 / 1, A5 / 2 and its newest version that is A5 / 3.
This final project has objective to simulate and analysis capability algorithm cryptography of A5/2, with method analysis random distribution in output, time process and performance, and avalanche effect.
After analyzing result of simulation, the reality is found by that mechanism of locking of algorithm A5/2 owning ability to be random of beet of before yielding output, so that will complicate all cryptanalyst to break an cipher text and also mount the scrambling by algorithm A5 / 2 influenced by most by key (Kc).
Ringkasan Alternatif
More and more the increasing of consumer amount the cellular phone of GSM make the information security which commuted for become one of aspect which important enough to be paid attention to. To take care of the secret of important data or conversation, one of its ways is by using method of cryptography. Algorithm A5 used as by method cryptography weared for the encoding of voice at system phone the cellular GSM. This Algorithm A5 divided to become the A5 / 1, A5 / 2 and its newest version that is A5 / 3.
This final project has objective to simulate and analysis capability algorithm cryptography of A5/2, with method analysis random distribution in output, time process and performance, and avalanche effect.
After analyzing result of simulation, the reality is found by that mechanism of locking of algorithm A5/2 owning ability to be random of beet of before yielding output, so that will complicate all cryptanalyst to break an cipher text and also mount the scrambling by algorithm A5 / 2 influenced by most by key (Kc).