Show simple item record

Analisis dan Implementasi Certificate Authorities (CA) pada Public Switched Telephone Network (PSTN)

dc.contributor.advisorGuritman, Sugi
dc.contributor.authorSupiyandi, Abi
dc.date.accessioned2013-03-28T01:53:00Z
dc.date.available2013-03-28T01:53:00Z
dc.date.issued2010
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/61757
dc.description.abstractSecure Telephone Protocol has ability to authenticate involved party and keep the secrecy of the message sent over the protocol. The secrecy of the message archieved by using symmetric key cryptographic scheme, and authentication archieved using public key cryptographic scheme. One of several party involved in the protocol and hold an important function called Certificate Authorities or CA. CA responsible for generating public key pair for other party involved in the protocol. When CA generates public key pair, several primitive cryptographic scheme used for guarantee the security of the key. Two of them are hash function SHA-1 and El-Gamal public key scheme embedded in Digital Signature Algorithm scheme. The prototype implementing the scheme above developed using Java programming language with JCE addition from Bauncy Castle. The analysis towards implemented prototype indicates that the prototype still has some flaws to be implemented in real world.en
dc.subjectCertificate Authoritiesen
dc.subjectSecure Telephoneen
dc.subjectBouncy Castle provideren
dc.subjectPublic Key Infrastructure.en
dc.titleAnalysis and Implementation of Certificate Authorities (CA) on Public Switched Telephone Network (PSTN).en
dc.titleAnalisis dan Implementasi Certificate Authorities (CA) pada Public Switched Telephone Network (PSTN)


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record