Kriptografi klasik termasuk kedalam kriptografi simetris karena kunci untuk mengenkripsi dan mendekripsi pesan adalah sama. Kriptografi klasik terbagi menjadi dua, yaitu cipher substitusi (substitution cipher) dan cipher transposisi (transposition cipher).
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgC7AuJ4O1JlmNclNCfJ13IwH47w6v_1lNs5V9IpGOSgrQTb5Cgtg63JejDHfX4ilr-OmPls43rG2HcZg26mvPeEKkUtaFPQFTddCOe1NvtN5-bzLtmOtoQUrfdWHtTo_EPVsL1UG9Ke7a2/s400/hieroglyph-glossary-jan-1-20091.jpg)
by Lalu Galih Gasendra
Pustaka:
�Baldoni, M.W., Ciliberto, C., & Piecantini Cattaneo, G.M. (2009). Elementary Number Theory, Cryptography and Codes. Heidelberg: Springer.
�Lidl, R., & Pilz, G.(1997). Applied Abstract Algebra, Second Edition. New York: Springer.
�Menezes, A. J. ,van Oorschot, P. C, and Vanstone, S. S. (1996). Handbook of Applied Cryptography. USA: CRC Press, Inc.
�Munir, R. (2004). Diktat Kuliah IF5054 Kriptografi. Departemen Teknik Informatika Institut Teknologi Bandung.
�PGP. (2004). An Introduction to Cryptography. New York: PGP Corporation.
�Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition. John Wiley and Son, Inc.
Pustaka:
�Baldoni, M.W., Ciliberto, C., & Piecantini Cattaneo, G.M. (2009). Elementary Number Theory, Cryptography and Codes. Heidelberg: Springer.
�Lidl, R., & Pilz, G.(1997). Applied Abstract Algebra, Second Edition. New York: Springer.
�Menezes, A. J. ,van Oorschot, P. C, and Vanstone, S. S. (1996). Handbook of Applied Cryptography. USA: CRC Press, Inc.
�Munir, R. (2004). Diktat Kuliah IF5054 Kriptografi. Departemen Teknik Informatika Institut Teknologi Bandung.
�PGP. (2004). An Introduction to Cryptography. New York: PGP Corporation.
�Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition. John Wiley and Son, Inc.
0 komentar:
Posting Komentar