Arsitektur Keamanan Siber Dengan Protokol Denning-Sacco

Authors

  • Rama Dian Syah Fakultas Teknologi Informasi, Universitas Gunadarma

DOI:

https://doi.org/10.32493/informatika.v5i2.5675

Keywords:

Cyber Security, Denning-Sacco Protocol

Abstract

Currently messages can be transmitted using information and communication technology. The message that is transmitted can contain data and information that is privacy or confidential. Messages that are confidential and privacy are only intended for parties that have been determined. Attacks by unauthorized parties may occur during the process of sending the message. Security in a private or confidential message exchange system is very much needed. The message exchange system is regulated by protocol to avoid certain party attacks. The method used in this research is the Denning-Sacco Protocol which is implemented in the exchange of messages from the sender to the recipient. This protocol uses a security key generated by the Key Distribution Center (KDC). The Denning-Sacco Protocol was developed from the Needham-Schroeder Protocol. This study produces an overview of the architecture of the Denning-Sacco Protocol to overcome the weaknesses of the Needham-Schroeder Protocol called the relpy attack. The steps of exchanging messages using the Denning-Sacco Protocol are explained in detail.

References

Chintia, E., Nadiah, R., Ramadhani, H. N., Haedar, Z. F., Febriansyah, A., & S.kom., M. N. (2019). Kasus Kejahatan Siber yang Paling Banyak Terjadi di Indonesia dan Penanganannya. Journal of Information Engineering and Educational Technology, 2(2), 65-69. doi:10.26740/jieet.v2n2.p65-69.

Syah, R. D., & Suhatril, R. J. (2019). Digital Image Cryptography Using Combination of Arnold’s Cat Map and Bernoulli Map Based on Chaos Theory, 4(2), 258-262. doi:10.5281/zenodo.3153338.

Sanjaya, M. B. (2017). Inisialisasi Key Generating Kriptografi AES Pada Pendekatan Protokol SMSSEC. Jurnal Infotel, 9(1), 18-23. doi:10.20895/infotel.v9i1.142.

Sultana, S., Jabiullah, M. I., & Rahman, M. L. (2009). Improved Needham-Schroeder protocol for secured and efficient key distributions. 2009 12th International Conference on Computers and Information Technology. doi:10.1109/iccit.2009.5407301.

Nesi, M., & Rucci, G. (2005). Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting. Electronic Notes in Theoretical Computer Science, 135(1), 95-114. doi:10.1016/j.entcs.2005.06.002.

Downloads

Published

2020-06-30