Implementation of AES Algorithm for Information Security of Web-Based Application

  • Authors

    • Janner Simarmata
    • Tonni Limbong
    • Misalina BR Ginting
    • Romanus Damanik
    • Muhammad Irwan Padli Nasution
    • Abdul Halim Hasugian
    • M Mesran
    • Abdul Sani Sembiring
    • Harvei Desmon Hutahaean
    • Insan Taufik
    • Paska Marto Hasugian
    • Hengki Tamando Sihotang
    • Asaziduhu Gea
    • Marlyna Infryanty Hutapea
    • Indra Kelana Jaya
    • Doli Hasibuan
    • Alfonsus Situmorang
    • Jimmy Febrinus Naibaho
    • Junika Junika Napitupulu
    • Sonny Leston Hutabarat
    • Muhammad Ikhsan Setiawan
    • Marzuki Sinambela
    https://doi.org/10.14419/ijet.v7i3.4.20124
  • AES Algorithm, Information Security, Encryption, Decrytion
  • Abstract

    This study focused on designing a web-based information security system to secure text and image files using the AES (Advanced Encryption Standard) algorithm to encrypt and decrypt text and image files. This web-based system is designed to help users easily access applications online. The conclusion of this study proves that the AES Algorithm method is a very good algorithm in securing text and image files, and with this web-based information security application, information confidentiality is more awake and in the decryption process, the results of the decryption file contents are not changed at all.

     

     
  • References

    1. [1] J. Simarmata, “Pengamanan Sistem Komputer,†Andi, Yogyakarta, 2006.

      [2] G. Gunawan et al., “Mobile Application Detection of Road Damage using Canny Algorithm,†in Journal of Physics: Conference Series, 2018, vol. 1019, no. 1, p. 12035.

      [3] R. Rahim et al., “Internet based remote desktop using INDY and socket component,†Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 44–47, 2018.

      [4] B. Silaban and T. Limbong, “Aplikasi Pembelajaran Pengenalan Kriptografi Algoritma Affine Cipher Dan Vigenere Cipher Menggunakan Metode Computer Assisted Instruction,†Media Inf. Anal. dan Sist., vol. 2, no. 2, pp. 14–20, 2017.

      [5] G. Singh and S. Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,†Int. J. Comput. Appl., vol. 67, no. 19, pp. 33–38, 2013.

      [6] J. Simarmata, “Pengenalan Teknologi Komputer dan Informasi,†Yogyakarta Andi, 2006.

      [7] A. Widarma, “COMBINATION AES, RC4 AND ELGAMAL ALGORITHM IN HYBRID SCHEME FOR DATA SECURITY,†Comput. Eng. Sci. Syst. J., vol. 1, no. 1, pp. 1–8, Jan. 2016.

      [8] T. Limbong and P. D. P. Silitonga, “Testing the Classic Caesar Cipher Cryptography using of Matlab.â€

      [9] R. Rahim et al., “Block Architecture Problem with Depth First Search Solution and Its Application,†J. Phys. Conf. Ser., vol. 954, no. 1, 2018.

      [10] G. Gunawan et al., “Mobile Application Detection of Road Damage using Canny Algorithm,†in Journal of Physics: Conference Series, 2018, vol. 1019, no. 1.

      [11] M. S. Reddy and M. Y. A. Babu, “Evaluation Of Microblaze and ImplementationOf AES Algorithm using Spartan-3E,†Int. J. Adv. Res. Electr. Electron. Instrum. Energy, vol. 2, no. 7, pp. 3341–3347, Jan. 1970.

      [12] R. Anokye, E. S. Bakar, A. Y. Abare, R. M. Kalong, and A. Muhammad, The difference in density along the bamboo culms of Gigantochloa scortichinii and Bambusa vulgaris. 2014.

      [13] M. J. Dworkin, “Recommendation for block cipher modes of operation : National Inst of Standards and Technology Gaithersburg Md Computer Security Div,†2007.

      [14] D. Blazhevski, “Modes of operation of the aes algorithm,†no. Ciit, pp. 212–216, 2013.

      [15] A. Altigani, M. Abdelmagid, and B. Barry, “Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations,†Indian J. Sci. Technol., vol. 9, no. 28, 2016.

  • Downloads

  • Received date: September 23, 2018

    Accepted date: September 23, 2018