Evaluation of State Cryptographic Institutions

Adi Sulistyo, Yono Reksoprodjo


State cryptographic institutions, coordinated by the State Cryptography Agency have contribute to protect the state classified information from potential threats and vulnerabilities posed by information warfare, using the methods of cryptography. State Cryptography Agency, so that need the anticipatory efforts to reduce the inhibiting factors. The research was conducted using the qualitative research methods with descriptive analysis techniques. Based on this research, it is known that the role of State Cryptography Agency in facing the information warfare is more widely available in the defense/defensive effort to protect state information, as well as there are still some factors that cannot be minimized.


Cryptography, Information, Information Security, Information War, National Crypto Agency

Full Text:



Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. computers & security. Vol. 32. pp. 90-101. DOI: http://dx.doi.org/10.1016/j.cose.2012.09.010

CERT ID. (2013). Report of the bi-month. Retrieved from http://www.cert.or.id.

Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed methods approaches. California: SAGE Publications, Inc.

Ciampa, M. (2010). Security awareness: Applying practical security in your world. Boston: Cengage Learning.

Haeni, R. E. (1997). Information warfare: An introduction. Washington: Cyberspace Policy Institute, The George Washington University.

Hutchinson, B., and Warren, M. (2001). Information warfare: Corporate attack and defence in a digital world. Oxford: Butterworth Heinemann.

Krutz, R. L., and Vines, R. D. (2007). The CISSP® and CAPCM prep guide: Platinum edition, Indianapolis: Wiley Publishing, Inc.

Lembaga Sandi Negara. (2007). Jelajah Kriptologi. Jakarta: Lembaga Sandi Negara.

Libicki, M. C. (1996). What is information warfare? Washington: National Defense University.

McLeod, R., and Schell, G. P. (2004). Management information systems. New Jersey: Prentice Hall.

Peltier, T. R. (2014). Information security fundamentals. Boca Raton: CRC Press.

Schaeffer, R. C. (2010). CNSS instruction No. 4009: National Information Assurance (NIA) Glossary. Maryland: Committee on National Security Systems.

Thornton, R. (2011). Asymmetric warfare: Threat and response in the twenty-first century. Cambridge: Polity Press.

Thomas, T. (2014). Russia’s Information Warfare Strategy: Can the Nation Cope in Future Conflicts?. The Journal of Slavic Military Studies. Vol. 27 No. 1. pp. 101-130. DOI: 10.1080/13518046.2014.874845

Taddeo, M. (2012). Information warfare: A philosophical perspective. Philosophy & Technology. Vol. 25 No. 1. pp. 105-120.

Whitman, M. E. (2003). Communication of the ACM/Vol.46 No.8: Enemy at the Gate – Threats to Information Security. New York: Association for Computing Machinery.

Whitman, M. E., and Mattord, H. J. (2011). Principles of information security. Atlanta: Cengage Learning.

Wilson, C. (2007). Information operations, electronic warfare, and cyberwar: Capabilities and related policy issues. Washington: CRS.

DOI: http://dx.doi.org/10.33172/jp.v1i2.61

Article Metrics

Abstract view : 141 times
PDF - 103 times

Lisensi Creative Commons
Jurnal Pertahanan is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.