Implementation of AES Algorithm for Information Security of Web-Based Application

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    This study focused on designing a web-based information security system to secure text and image files using the AES (Advanced Encryption Standard) algorithm to encrypt and decrypt text and image files. This web-based system is designed to help users easily access applications online. The conclusion of this study proves that the AES Algorithm method is a very good algorithm in securing text and image files, and with this web-based information security application, information confidentiality is more awake and in the decryption process, the results of the decryption file contents are not changed at all.

     

     

  • Keywords


    AES Algorithm, Information Security , Encryption, Decrytion

  • References


      [1] J. Simarmata, “Pengamanan Sistem Komputer,” Andi, Yogyakarta, 2006.

      [2] G. Gunawan et al., “Mobile Application Detection of Road Damage using Canny Algorithm,” in Journal of Physics: Conference Series, 2018, vol. 1019, no. 1, p. 12035.

      [3] R. Rahim et al., “Internet based remote desktop using INDY and socket component,” Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 44–47, 2018.

      [4] B. Silaban and T. Limbong, “Aplikasi Pembelajaran Pengenalan Kriptografi Algoritma Affine Cipher Dan Vigenere Cipher Menggunakan Metode Computer Assisted Instruction,” Media Inf. Anal. dan Sist., vol. 2, no. 2, pp. 14–20, 2017.

      [5] G. Singh and S. Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,” Int. J. Comput. Appl., vol. 67, no. 19, pp. 33–38, 2013.

      [6] J. Simarmata, “Pengenalan Teknologi Komputer dan Informasi,” Yogyakarta Andi, 2006.

      [7] A. Widarma, “COMBINATION AES, RC4 AND ELGAMAL ALGORITHM IN HYBRID SCHEME FOR DATA SECURITY,” Comput. Eng. Sci. Syst. J., vol. 1, no. 1, pp. 1–8, Jan. 2016.

      [8] T. Limbong and P. D. P. Silitonga, “Testing the Classic Caesar Cipher Cryptography using of Matlab.”

      [9] R. Rahim et al., “Block Architecture Problem with Depth First Search Solution and Its Application,” J. Phys. Conf. Ser., vol. 954, no. 1, 2018.

      [10] G. Gunawan et al., “Mobile Application Detection of Road Damage using Canny Algorithm,” in Journal of Physics: Conference Series, 2018, vol. 1019, no. 1.

      [11] M. S. Reddy and M. Y. A. Babu, “Evaluation Of Microblaze and ImplementationOf AES Algorithm using Spartan-3E,” Int. J. Adv. Res. Electr. Electron. Instrum. Energy, vol. 2, no. 7, pp. 3341–3347, Jan. 1970.

      [12] R. Anokye, E. S. Bakar, A. Y. Abare, R. M. Kalong, and A. Muhammad, The difference in density along the bamboo culms of Gigantochloa scortichinii and Bambusa vulgaris. 2014.

      [13] M. J. Dworkin, “Recommendation for block cipher modes of operation : National Inst of Standards and Technology Gaithersburg Md Computer Security Div,” 2007.

      [14] D. Blazhevski, “Modes of operation of the aes algorithm,” no. Ciit, pp. 212–216, 2013.

      [15] A. Altigani, M. Abdelmagid, and B. Barry, “Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations,” Indian J. Sci. Technol., vol. 9, no. 28, 2016.


 

View

Download

Article ID: 20124
 
DOI: 10.14419/ijet.v7i3.4.20124




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.