Implementation of AES Algorithm for Information Security of Web-Based Application
-
https://doi.org/10.14419/ijet.v7i3.4.20124 -
AES Algorithm, Information Security, Encryption, Decrytion -
Abstract
This study focused on designing a web-based information security system to secure text and image files using the AES (Advanced Encryption Standard) algorithm to encrypt and decrypt text and image files. This web-based system is designed to help users easily access applications online. The conclusion of this study proves that the AES Algorithm method is a very good algorithm in securing text and image files, and with this web-based information security application, information confidentiality is more awake and in the decryption process, the results of the decryption file contents are not changed at all.
Â
 -
References
[1] J. Simarmata, “Pengamanan Sistem Komputer,†Andi, Yogyakarta, 2006.
[2] G. Gunawan et al., “Mobile Application Detection of Road Damage using Canny Algorithm,†in Journal of Physics: Conference Series, 2018, vol. 1019, no. 1, p. 12035.
[3] R. Rahim et al., “Internet based remote desktop using INDY and socket component,†Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 44–47, 2018.
[4] B. Silaban and T. Limbong, “Aplikasi Pembelajaran Pengenalan Kriptografi Algoritma Affine Cipher Dan Vigenere Cipher Menggunakan Metode Computer Assisted Instruction,†Media Inf. Anal. dan Sist., vol. 2, no. 2, pp. 14–20, 2017.
[5] G. Singh and S. Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,†Int. J. Comput. Appl., vol. 67, no. 19, pp. 33–38, 2013.
[6] J. Simarmata, “Pengenalan Teknologi Komputer dan Informasi,†Yogyakarta Andi, 2006.
[7] A. Widarma, “COMBINATION AES, RC4 AND ELGAMAL ALGORITHM IN HYBRID SCHEME FOR DATA SECURITY,†Comput. Eng. Sci. Syst. J., vol. 1, no. 1, pp. 1–8, Jan. 2016.
[8] T. Limbong and P. D. P. Silitonga, “Testing the Classic Caesar Cipher Cryptography using of Matlab.â€
[9] R. Rahim et al., “Block Architecture Problem with Depth First Search Solution and Its Application,†J. Phys. Conf. Ser., vol. 954, no. 1, 2018.
[10] G. Gunawan et al., “Mobile Application Detection of Road Damage using Canny Algorithm,†in Journal of Physics: Conference Series, 2018, vol. 1019, no. 1.
[11] M. S. Reddy and M. Y. A. Babu, “Evaluation Of Microblaze and ImplementationOf AES Algorithm using Spartan-3E,†Int. J. Adv. Res. Electr. Electron. Instrum. Energy, vol. 2, no. 7, pp. 3341–3347, Jan. 1970.
[12] R. Anokye, E. S. Bakar, A. Y. Abare, R. M. Kalong, and A. Muhammad, The difference in density along the bamboo culms of Gigantochloa scortichinii and Bambusa vulgaris. 2014.
[13] M. J. Dworkin, “Recommendation for block cipher modes of operation : National Inst of Standards and Technology Gaithersburg Md Computer Security Div,†2007.
[14] D. Blazhevski, “Modes of operation of the aes algorithm,†no. Ciit, pp. 212–216, 2013.
[15] A. Altigani, M. Abdelmagid, and B. Barry, “Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations,†Indian J. Sci. Technol., vol. 9, no. 28, 2016.
-
Downloads
-
How to Cite
Simarmata, J., Limbong, T., BR Ginting, M., Damanik, R., Irwan Padli Nasution, M., Halim Hasugian, A., Mesran, M., Sani Sembiring, A., Desmon Hutahaean, H., Taufik, I., Marto Hasugian, P., Tamando Sihotang, H., Gea, A., Infryanty Hutapea, M., Kelana Jaya, I., Hasibuan, D., Situmorang, A., Febrinus Naibaho, J., Junika Napitupulu, J., … Sinambela, M. (2018). Implementation of AES Algorithm for Information Security of Web-Based Application. International Journal of Engineering & Technology, 7(3.4), 318-320. https://doi.org/10.14419/ijet.v7i3.4.20124Received date: 2018-09-23
Accepted date: 2018-09-23