Kriptografi klasik termasuk kedalam kriptografi simetris karena kunci untuk mengenkripsi dan mendekripsi pesan adalah sama. Kriptografi klasik terbagi menjadi dua, yaitu cipher substitusi (substitution cipher) dan cipher transposisi (transposition cipher).

by Lalu Galih Gasendra
Pustaka:
•Baldoni, M.W., Ciliberto, C., & Piecantini Cattaneo, G.M. (2009). Elementary Number Theory, Cryptography and Codes. Heidelberg: Springer.
•Lidl, R., & Pilz, G.(1997). Applied Abstract Algebra, Second Edition. New York: Springer.
•Menezes, A. J. ,van Oorschot, P. C, and Vanstone, S. S. (1996). Handbook of Applied Cryptography. USA: CRC Press, Inc.
•Munir, R. (2004). Diktat Kuliah IF5054 Kriptografi. Departemen Teknik Informatika Institut Teknologi Bandung.
•PGP. (2004). An Introduction to Cryptography. New York: PGP Corporation.
•Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition. John Wiley and Son, Inc.
Pustaka:
•Baldoni, M.W., Ciliberto, C., & Piecantini Cattaneo, G.M. (2009). Elementary Number Theory, Cryptography and Codes. Heidelberg: Springer.
•Lidl, R., & Pilz, G.(1997). Applied Abstract Algebra, Second Edition. New York: Springer.
•Menezes, A. J. ,van Oorschot, P. C, and Vanstone, S. S. (1996). Handbook of Applied Cryptography. USA: CRC Press, Inc.
•Munir, R. (2004). Diktat Kuliah IF5054 Kriptografi. Departemen Teknik Informatika Institut Teknologi Bandung.
•PGP. (2004). An Introduction to Cryptography. New York: PGP Corporation.
•Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition. John Wiley and Son, Inc.
No comments:
Post a Comment