RANCANG BANGUN SIMULASI PEMANFAATAN METODE INTERLOCK PROTOCOL UNTUK MENGATASI MAN-IN-THE-MIDDLE-ATTACK BERBASIS DEKSTOP

  • Rudi Syah Putra
Keywords: Communication, encryption, man-in-the-middle-attack

Abstract

In the process of data communication, even though the data has been encrypted, there is a possibility
that the data can be known by others. One possibility is that the person intercepted the
communication media used by the two people who were communicating. This is what is called manin-the-middle-attack.
This
man-in-the-middle-attack
problem
can
be
prevented
by
using
the
interlock
protocol.
This
interlock
protocol
was
created
by
Ron
Rivest
and
Adi
Shamir.
The
core
algorithm
of
this

protocol is that it sends 2 encrypted messages. The first part can be the result of the one way
hash function of the message and the second part is the encrypted message itself. This causes the
intercepting person to be unable to decrypt the first message using his private key. He can only create
a new message and send it to the person who will receive the message.

Published
2020-07-17
Section
Publikasi