Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yusuf Kurniawan is active.

Publication


Featured researches published by Yusuf Kurniawan.


international conference on electrical engineering and informatics | 2011

The design of mini PGP security

Yusuf Kurniawan; Aan Albone; Hari Rahyuwibowo

We created Mini PGP application which has the function as encryption/description and digital signatures. The other functions of PGP had been removed in the pursuit of facilitating everybody in checking its security. Asymmetry algorithm utilizes the RSA 4096 bit only while symmetry algorithm utilizes Twofish only. We use SHA256 as hash function. This paper shows the security analysis of mini PGP. Comprehensive analysis on PGP conventional version of Windows is highly complex due to very large amount of source code. The goodness of mini PGP is more secured against dictionary attack and spyware if compared with the conventional one. Some PGP for Windows has also the program code that is able to tap the keyboard typing.


frontiers of information technology | 2016

Design of TCP SYN Flood DDoS attack detection using artificial immune systems

Gilang Ramadhan; Yusuf Kurniawan; Chang-Soo Kim

TCP Flood DDoS attack is one of the most commonly-used attacks. DDoS has a huge impact on the victim because DDoS attack can multiply the power of attack and makes the victim server unavailable for the normal user. Recently, there are many types of research about DDoS attacks and the detection or mitigation techniques. One of the novel methods to detect DDoS is using dendritic cell algorithm (DCA). DCA is a kind of artificial immune system in the evolutionary algorithm that can be used as an anomaly detection. The DCA is also designed to solve the problem in network intrusion detection. In this paper tries to make a design of TCP Flood DDoS attack detection using artificial immune systems, especially dendritic cell algorithm.


International Journal of Network Security | 2009

The New Block Cipher: BC2

Yusuf Kurniawan; A Adang Suwandi; M. Sukrisno Mardiyanto; S Iping Supriana; Sarwono Sutikno

In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum Distance Separable (MDS) 8x8 with branch number 9 to give high diffusion, a function affine equivalent to the inverse function in GF(2^8) that we get from Camellia and Hierocrypt S-Box for confusion and we make FN function, based on FL function of Camellia. We use a heuristic method to count the minimum number of active substitution box at Feistel Network. And we also construct a new key schedule that is fast and secure.


international conference on telecommunication systems services and applications | 2012

SOC design and FPGA implementation of Digital TV receiver

Amy Hamidah Salman; Trio Adiono; Willy Anugrah Cahyadi; Yusuf Kurniawan

This paper proposes a System-on-chip (SoC) Architecture Design for real-time Digital TV receiver. The SoC includes RF interface, a Host Processor, a Physical Layer and Ethernet interface. The Physical Layer itself consists of Baseband Processing modules based on DVB-T standard which includes 2048-point FFT/IFFT, Channel Decoder, Synchronizer, Equalizer, Demodulator, etc. The SoC utilizes a 32-bit RISC based processor acting as the Host Processor. Both Processor and Physical layer works on 32 MHz clock cycle to ensure low power consumption. A real-time OS based on eCos is also used for controlling the Physical Layer and interfaces in a real-time basis. The system is implemented using FPGA and has been verified capable of receiving a realtime video transmitted by a standard digital TV transmitter/modulator.


frontiers of information technology | 2016

Security analysis testing for secure instant messaging in android with study case: Telegram

Aditya Candra; Yusuf Kurniawan; Kyung-Hyune Rhee

Instant messaging activity plays a major role in our life. With increasing usage of mobile phones and instant messaging users, vulnerabilities against these devices raised exponentially. In this paper, we propose a security analysis testing for secure instant messaging apps in Android which is designed using a threat analysis, considering possible attack scenarios and vulnerabilities specific to the domain. To demonstrate the testing methodology, we subsequently analyze one of the popular instant messaging that promises security and privacy for its users, Telegram. Therefore, we give detailed discussion about vulnerabilities that help developer to design for further secure application developments.


2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) | 2014

Improved generalizations of the Karatsuba algorithm in GF(2 n )

Muhamad Nursalman; Arif Sasongko; Yusuf Kurniawan; Kuspriyanto

The process of multiplications in Finite Fields required huge resources. If those implemented in the Elliptic Curve Cryptography (ECC), the need of resources would be inflated because those processes were enough to dominated in every ECC level. There were many researches to found methods that could reduce the number of multiplications. One method that was well-known and developed was Karatsuba ofman algorithm, where the development of this research were General Karatsuba Multiplier, Efficient Multiplier in GF((2n)4) Generalizations of Karatsuba Algorithm, 5-6-7 Term Karatsuba-Like Formulae, and improved modulo functions. From those researches is made a better algorithm than Generalizations of Karatsuba Algorithm and it is expected to leads to generalize the form n-Term Karatsuba-Like Formulae.


Journal of Mathematical and Fundamental Sciences | 2006

Analisis Sandi Diferensial terhadap AES, DES dan AE1

Yusuf Kurniawan; Adang Suwandi Ahmad; M. Sukrisno Mardiyanto; Iping Supriana; Sarwono Sutikno


Journal of ICT Research and Applications | 2011

Architecture for the Secret-Key BC3 Cryptography Algorithm

Arif Sasongko; Hidayat Hidayat; Yusuf Kurniawan; Sarwono Sutikno


Seminar Nasional Aplikasi Teknologi Informasi (SNATI) | 2005

Analisis Sandi Diferensial terhadap Full Data Encryption Standard

Yusuf Kurniawan; A Adang Suwandi; M. Sukrisno Mardiyanto; S Iping Supriana


International Journal of Network Security | 2018

Design of an AES Device as Device Under Test in a DPA Attack.

Septafiansyah Dwi Putra; Ma'muri; Sarwono Sutikno; Yusuf Kurniawan; Adang Suwandi Ahmad

Collaboration


Dive into the Yusuf Kurniawan's collaboration.

Top Co-Authors

Avatar

Sarwono Sutikno

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Adang Suwandi Ahmad

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

M. Sukrisno Mardiyanto

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Septafiansyah Dwi Putra

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arif Sasongko

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Gilang Ramadhan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ma'muri

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Aditya Candra

Pukyong National University

View shared research outputs
Top Co-Authors

Avatar

Chang-Soo Kim

Pukyong National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge