Implementation of AES Algorithm for Information Security of Web-Based Application
-
https://doi.org/10.14419/ijet.v7i3.4.20124
-
AES Algorithm, Information Security, Encryption, Decrytion -
Abstract
This study focused on designing a web-based information security system to secure text and image files using the AES (Advanced Encryption Standard) algorithm to encrypt and decrypt text and image files. This web-based system is designed to help users easily access applications online. The conclusion of this study proves that the AES Algorithm method is a very good algorithm in securing text and image files, and with this web-based information security application, information confidentiality is more awake and in the decryption process, the results of the decryption file contents are not changed at all.
Â
 -
References
[1] J. Simarmata, “Pengamanan Sistem Komputer,†Andi, Yogyakarta, 2006.
[2] G. Gunawan et al., “Mobile Application Detection of Road Damage using Canny Algorithm,†in Journal of Physics: Conference Series, 2018, vol. 1019, no. 1, p. 12035.
[3] R. Rahim et al., “Internet based remote desktop using INDY and socket component,†Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 44–47, 2018.
[4] B. Silaban and T. Limbong, “Aplikasi Pembelajaran Pengenalan Kriptografi Algoritma Affine Cipher Dan Vigenere Cipher Menggunakan Metode Computer Assisted Instruction,†Media Inf. Anal. dan Sist., vol. 2, no. 2, pp. 14–20, 2017.
[5] G. Singh and S. Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,†Int. J. Comput. Appl., vol. 67, no. 19, pp. 33–38, 2013.
[6] J. Simarmata, “Pengenalan Teknologi Komputer dan Informasi,†Yogyakarta Andi, 2006.
[7] A. Widarma, “COMBINATION AES, RC4 AND ELGAMAL ALGORITHM IN HYBRID SCHEME FOR DATA SECURITY,†Comput. Eng. Sci. Syst. J., vol. 1, no. 1, pp. 1–8, Jan. 2016.
[8] T. Limbong and P. D. P. Silitonga, “Testing the Classic Caesar Cipher Cryptography using of Matlab.â€
[9] R. Rahim et al., “Block Architecture Problem with Depth First Search Solution and Its Application,†J. Phys. Conf. Ser., vol. 954, no. 1, 2018.
[10] G. Gunawan et al., “Mobile Application Detection of Road Damage using Canny Algorithm,†in Journal of Physics: Conference Series, 2018, vol. 1019, no. 1.
[11] M. S. Reddy and M. Y. A. Babu, “Evaluation Of Microblaze and ImplementationOf AES Algorithm using Spartan-3E,†Int. J. Adv. Res. Electr. Electron. Instrum. Energy, vol. 2, no. 7, pp. 3341–3347, Jan. 1970.
[12] R. Anokye, E. S. Bakar, A. Y. Abare, R. M. Kalong, and A. Muhammad, The difference in density along the bamboo culms of Gigantochloa scortichinii and Bambusa vulgaris. 2014.
[13] M. J. Dworkin, “Recommendation for block cipher modes of operation : National Inst of Standards and Technology Gaithersburg Md Computer Security Div,†2007.
[14] D. Blazhevski, “Modes of operation of the aes algorithm,†no. Ciit, pp. 212–216, 2013.
[15] A. Altigani, M. Abdelmagid, and B. Barry, “Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations,†Indian J. Sci. Technol., vol. 9, no. 28, 2016.
-
Downloads
-
Received date: September 23, 2018
Accepted date: September 23, 2018