Arsitektur Keamanan Siber Dengan Protokol Denning-Sacco
DOI:
https://doi.org/10.32493/informatika.v5i2.5675Keywords:
Cyber Security, Denning-Sacco ProtocolAbstract
Currently messages can be transmitted using information and communication technology. The message that is transmitted can contain data and information that is privacy or confidential. Messages that are confidential and privacy are only intended for parties that have been determined. Attacks by unauthorized parties may occur during the process of sending the message. Security in a private or confidential message exchange system is very much needed. The message exchange system is regulated by protocol to avoid certain party attacks. The method used in this research is the Denning-Sacco Protocol which is implemented in the exchange of messages from the sender to the recipient. This protocol uses a security key generated by the Key Distribution Center (KDC). The Denning-Sacco Protocol was developed from the Needham-Schroeder Protocol. This study produces an overview of the architecture of the Denning-Sacco Protocol to overcome the weaknesses of the Needham-Schroeder Protocol called the relpy attack. The steps of exchanging messages using the Denning-Sacco Protocol are explained in detail.
References
Chintia, E., Nadiah, R., Ramadhani, H. N., Haedar, Z. F., Febriansyah, A., & S.kom., M. N. (2019). Kasus Kejahatan Siber yang Paling Banyak Terjadi di Indonesia dan Penanganannya. Journal of Information Engineering and Educational Technology, 2(2), 65-69. doi:10.26740/jieet.v2n2.p65-69.
Syah, R. D., & Suhatril, R. J. (2019). Digital Image Cryptography Using Combination of Arnold’s Cat Map and Bernoulli Map Based on Chaos Theory, 4(2), 258-262. doi:10.5281/zenodo.3153338.
Sanjaya, M. B. (2017). Inisialisasi Key Generating Kriptografi AES Pada Pendekatan Protokol SMSSEC. Jurnal Infotel, 9(1), 18-23. doi:10.20895/infotel.v9i1.142.
Sultana, S., Jabiullah, M. I., & Rahman, M. L. (2009). Improved Needham-Schroeder protocol for secured and efficient key distributions. 2009 12th International Conference on Computers and Information Technology. doi:10.1109/iccit.2009.5407301.
Nesi, M., & Rucci, G. (2005). Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting. Electronic Notes in Theoretical Computer Science, 135(1), 95-114. doi:10.1016/j.entcs.2005.06.002.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Jurnal Informatika Universitas Pamulang have CC-BY-NC or an equivalent license as the optimal license for the publication, distribution, use, and reuse of scholarly work.
In developing strategy and setting priorities, Jurnal Informatika Universitas Pamulang recognize that free access is better than priced access, libre access is better than free access, and libre under CC-BY-NC or the equivalent is better than libre under more restrictive open licenses. We should achieve what we can when we can. We should not delay achieving free in order to achieve libre, and we should not stop with free when we can achieve libre.
Jurnal Informatika Universitas Pamulang is licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
YOU ARE FREE TO:
- Share : copy and redistribute the material in any medium or format
- Adapt : remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms