DAFTAR ISI
LEMBAR JUDUL LEMBAR PENGESAHAN SURAT PERNYATAAN ABSTRAK ...................................................................................................
i
ABSTRACT ..................................................................................................
ii
KATA PENGANTAR .................................................................................
iii
DAFTAR ISI ................................................................................................
v
DAFTAR TABEL .......................................................................................
viii
DAFTAR GAMBAR ...................................................................................
ix
BAB I
PENDAHULUAN 1.1
Latar Belakang Masalah .................................................
I-1
1.2
Rumusan Masalah ..........................................................
I-2
1.3
Tujuan .............................................................................
I-2
1.4
Batasan Masalah .............................................................
I-2
1.5
Metode Pengembangan Aplikasi ....................................
I-2
1.6
Sistematika Penulisan .....................................................
I-4
BAB II
LANDASAN TEORI 2.1 2.2 2.3
2.4 2.5
Pengertian Aplikasi[2] ...................................................... [3]
Kriptografi
................................................................... [2]
Algoritma Twofish
II-1 II-1
.......................................................
II-4
2.3.1 Fungsi F [3] ..........................................................
II-6
2.3.2 Fungsi G [3] ..........................................................
II-7
2.3.3 Blok Pembangunan Twofish [3] ..........................
II-7
Eavesdropping[8] .............................................................
II-9
Multimedia Messaging Service (MMS)
v
[9]
......................
II-10
2.6
Teknologi J2ME[10] ......................................................... 2.6.1 Wireless Toolkit 2.5.2
[11]
II-10
.....................................
II-11
............................................................
II-12
2.6.2.1 Siklus MIDlet .......................................
II-12
2.7
NetBeans[13] ....................................................................
II-13
2.8
Data Flow Diagram (DFD)[14] ........................................
II-14
2.8.1 Levelisasi DFD ...................................................
II-14
2.8.2 Komponen-komponen pada DFD .......................
II-15
2.6.2 MIDlet
2.9
[15]
Flowchart
[12]
...................................................................
II-16
BAB III
ANALISIS SISTEM MMS 3.1
Analisis Sistem ...............................................................
III-1
3.2
Deskripsi Sistem yang Ada ............................................
III-1
3.2.1 Data Context Diagram (DCD) MMS .................
III-4
3.2.2 Data Flow Diagram (DFD) MMS .....................
III-4
3.2.2.1 Data Flow Diagram (DFD) Level 1 MMS ....................................................
III-5
3.2.3 Kamus Data[18] ....................................................
III-5
3.2.4 Proses Specification (PSPEC)
[18]
........................
III-6
BAB IV
ANALISIS DAN PERANCANGAN As-MMS 4.1
Deskripsi Sistem yang Akan Dikembangkan .................
IV-1
4.1.1 Data Context Diagram (DCD) As-MMS ...........
IV-1
4.1.2 Data Flow Diagram (DFD) As-MMS ................
IV-2
4.1.2.1 Data Flow Diagram (DFD) Level 1
4.2
4.3
As-MMS ...............................................
IV-2
Kamus Data[18] ................................................................
IV-4
4.2.1 Proses Spesification (PSPEC) [18] .......................
IV-4
Perancangan Arsitektur Antarmuka ...............................
IV-5
4.3.1 Struktur Menu .....................................................
IV-5
4.3.2 Penjelasan Struktur Menu ...................................
IV-6
vi
4.4
4.5 BAB V
Perancangan Antarmuka .................................................
IV-6
4.4.1 Perancangan Antarmuka Main Menu .................
IV-7
4.4.2 Perancangan Antarmuka Write Messenger .........
IV-8
4.4.3 Perancangan Antarmuka Read Messenger .........
IV-9
Rencana Pengujian ......................................................... IV-10
IMPLEMENTASI DAN PENGUJIAN 5.1
Lingkungan Implementasi ..............................................
V-1
5.2
Tahap Implementasi .......................................................
V-2
5.3
Implementasi Antarmuka ...............................................
V-2
5.4
Proses-proses Utama ......................................................
V-5
5.5
Pengujian (Testing) .........................................................
V-7
5.5.1 Pengujian Perangkat Lunak ................................
V-8
5.5.2 Pengujian Metode Black Box .............................. V-12 5.5.2.1 Pengujian Kirim Pesan ......................... V-12 5.5.2.2 Pengujian Terima Pesan ....................... V-14 5.5.2.3 Pengujian Plaintext dan Ciphertext ...... V-16 5.5.2.4 Tabel Pengujian Key pada Besar File Gambar .......................................... V-19 BAB VI
PENUTUP 6.1
Kesimpulan .....................................................................
VI-1
6.2
Saran .............................................................................
VI-1
DAFTAR PUSTAKA LAMPIRAN-LAMPIRAN
vii
DAFTAR TABEL
Tabel 2.1
Simbol-simbol Flowchart ........................................................
Tabel 3.1
Skenario Penggunaan Multimedia Messenger Service (Pengirim) ................................................................................
Tabel 3.2
II-16
III-3
Skenario Penggunaan Multimedia Messenger Service (Penerima) ................................................................................
III-3
Tabel 3.3
Proses Tulis Pesan ...................................................................
III-6
Tabel 3.4
Proses Kirim ............................................................................
III-6
Tabel 3.5
Proses Terima Pesan ................................................................
III-6
Tabel 3.6
Proses Baca Pesan ....................................................................
III-7
Tabel 3.7
Pengujian File Gambar JPEG ..................................................
III-7
Tabel 3.8
Pengujian File Gambar PNG ...................................................
III-8
Tabel 3.9
Pengujian File Gambar BMP ...................................................
III-8
Tabel 4.1
Proses Enkripsi ........................................................................
IV-4
Tabel 4.2
Proses Pengiriman Pesan .........................................................
IV-5
Tabel 4.3
Proses Dekripsi ........................................................................
IV-5
Tabel 4.4
Penjelasan Perancangan Struktur Menu ..................................
IV-6
Tabel 5.1
Proses Enkripsi ........................................................................
V-6
Tabel 5.2
Proses Dekripsi ........................................................................
V-6
Tabel 5.3
Proses Kirim SMS ...................................................................
V-7
Tabel 5.4
Proses Terima MMS ................................................................
V-7
Tabel 5.5
Skenario Pengujian Perangkat Lunak ......................................
V-8
Tabel 5.6
Hasil dengan Format Gambar .jpeg ......................................... V-19
Tabel 5.7
Hasil dengan Format Gambar .png .......................................... V-20
Tabel 5.8
Hasil dengan Format Gambar .bmp ......................................... V-20
viii
DAFTAR GAMBAR
Gambar 2.1
Proses Enkripsi dan Dekripsi Sederhana ............................
II-2
Gambar 2.2
Struktur Algoritma Twofish[2] ..............................................
II-5
Gambar 2.3
Siklus Hidup MIDlet[12] .......................................................
II-13
Gambar 3.1
Flowchart Skenario Sistem yang Ada (Pengirim) ..............
III-2
Gambar 3.2
Flowchart Skenario Sistem yang Ada (Penerima) ..............
III-2
Gambar 3.3
Data Context Diagram (DCD) MMS .................................
III-3
Gambar 3.4
Data Flow Diagram (DFD) Level 1 MMS .........................
III-5
Gambar 3.5
Grafik Pengujian File Gambar JPEG ..................................
III-7
Gambar 3.6
Grafik Pengujian File Gambar PNG ...................................
III-8
Gambar 3.7
Grafik Pengujian File Gambar BMP ...................................
III-9
Gambar 4.1
Data Context Diagram (DCD) As-MMS ............................
IV-1
Gambar 4.2
Data Flow Diagram (DFD) Level 1 As-MMS ....................
IV-2
Gambar 4.3
Data Flow Diagram (DFD) Level 2 Proses 1.0 Tulis Pesan As-MMS ..........................................................
Gambar 4.4
IV-3
Data Flow Diagram (DFD) Level 2 Proses 2.0 Terima Pesan As-MMS .......................................................
IV-3
Gambar 4.5
Perancangan Struktur Menu ................................................
IV-6
Gambar 4.6
Perancangan Antar Muka Form Main Menu ......................
IV-7
Gambar 4.7
Perancangan Antar Muka Form Write Messenger ..............
IV-8
Gambar 4.8
Perancangan Antar Muka Form Read Messenger ..............
IV-9
Gambar 5.1
Tampilan Awal Membuka Aplikasi ....................................
V-2
Gambar 5.2
Tampilan Main Menu ..........................................................
V-3
Gambar 5.3
Tampilan Write Messenger .................................................
V-3
Gambar 5.4
Tampilan MMS Terkirim .....................................................
V-4
Gambar 5.5
Tampilan MMS Diterima ....................................................
V-4
Gambar 5.6
Tampilan Read Messenger ..................................................
V-5
Gambar 5.7
Pengiriman Pesan dengan 21 Karakter ............................... V-10
Gambar 5.8
Penerimaan Pesan dengan 21 Karakter ............................... V-10
ix
Gambar 5.9
Salah Kunci Saat Dekripsi Pesan ........................................ V-11
Gambar 5.10 Pengiriman Pesan dengan 3 Karakter ................................. V-11 Gambar 5.11 Penerimaan Pesan dengan 3 Karakter ................................. V-12 Gambar 5.12 Laporan Pesan Terkirim ...................................................... V-13 Gambar 5.13 Kunci Terisi ......................................................................... V-13 Gambar 5.14 Pengujian Kunci Kosong .................................................... V-14 Gambar 5.15 Pengujian Kunci Benar ....................................................... V-15 Gambar 5.16 Pengujian Kunci Salah ........................................................ V-15 Gambar 5.17 Plaintext Pengirim ............................................................... V-16 Gambar 5.18 Plaintext Penerima .............................................................. V-17 Gambar 5.19 Ciphertext Pengirim ............................................................ V-17 Gambar 5.20 Ciphertext Penerima ............................................................ V-18 Gambar 5.21 Hasil dengan Menggunakan Program (Pengirim) ............... V-18 Gambar 5.22 Hasil dengan Menggunakan Program (Penerima) .............. V-19
x