ALGORITMA AES128-CBC (ADVANCED ENCRYPTION STANDARD) UNTUK ENKRIPSI DAN DEKRIPSI BERKAS DOKUMEN PT. ADIARTA MUZIZAT
Abstract
The rapid advancement of digital technology has increased concerns about data security, especially in document storage and transmission. PT. Adiarta Muzizat, a logistics company, has experienced multiple data breaches, highlighting the need for a more secure encryption method. This study focuses on implementing the Advanced Encryption Standard (AES) 128-bit with Cipher Block Chaining (CBC) mode to enhance document security. The research follows the Rational Unified Process (RUP) methodology, comprising four phases: inception, elaboration, construction, and transition. The encryption and decryption processes were tested on various document formats, evaluating performance in terms of speed, file size differences, and resistance to brute-force attacks. The results indicate that AES-128-CBC successfully prevents unauthorized access, as encrypted documents remain unreadable without the correct decryption key. Additionally, security tests using Crackstation revealed that AES-128-CBC is significantly more resilient compared to MD5 and SHA-256. The study concludes that implementing AES-128-CBC enhances document confidentiality, ensuring data integrity and security. Future research could explore AES-256 or blockchain integration for improved security and efficiency.
References
Alfajar, F., Firdaus, R., & Ramadhan, M. (2021). Implementasi keamanan chat real-time menggunakan AES256-CBC dan Base64. Information System & Artificial Intelligence, 5(2), 112–125.
Andriyanto, M., & Sukmasetya, R. (2022). Penerapan algoritma AES untuk meningkatkan keamanan data transaksi pada sistem e-marketplace. Jurnal Teknologi dan Keamanan Digital, 7(1), 45–58.
Bai’at, A. A., Fahlevvi, M. R., & Ariandi, W. (2023). Metode Algoritma RC4 (Rivest Code 4) Untuk Pengamanan Database Transaksi Pada Glory Digital Sablon. Explore, 13(1), 20–31.
Chen, Y. (2024). Quantum computing and its impact on AES encryption: Security enhancements and vulnerabilities. International Journal of Cryptographic Security, 12(1), 10–25.
Febrianto, D., & Waluyo, S. (2023). Implementasi algoritma AES-256 dalam pengamanan database penilaian karyawan. Jurnal Keamanan Data dan Informasi, 9(3), 76–90.
Ghosh, A., Banerjee, S., & Mukherjee, R. (2020). A fast and efficient document encryption method for e-learning applications using modified AES-CBC with chaotic logistic pseudo-random number sequence. Advances in Mechanics, 8(4), 220–234.
González, C., & Fernández, A. (2021). An iterative approach to software development with RUP: Applications in encryption technologies. International Journal of Software Engineering, 45(3), 189–205. https://doi.org/10.1109/JSE.2021.065411
Handono, B. L., Wijaya, T., & Rahmadani, F. (2022). A file encoding using a combination of advanced encryption standard, cipher block chaining, and stream cipher in Telkom Region 4 Semarang. Journal of Applied Intelligent System, 11(2), 133–148.
Hu, Y. (2022). Efficient encryption algorithms for secure communication. Journal of Information Security, 15(4), 259–275. https://doi.org/10.1016/j.jinfosec.2022.02.008
Jin, H., Xu, L., & Li, J. (2021). Optimized AES encryption for secure document transfer. Computers & Security, 109, 102351. https://doi.org/10.1016/j.cose.2021.102351
Krut, J. (2021). Applying Rational Unified Process (RUP) to software development. Software Engineering Review, 58(8), 90–101. https://doi.org/10.1016/j.ser.2021.06.005
Kumar, A., Mishra, R., & Sharma, P. (2022). Cracking AES-128 CBC: An analysis of brute-force resistance. Security and Privacy, 12(5), 98–110. https://doi.org/10.1002/sec.3261
Kumari, D., Sharma, R., & Tiwari, M. (2022). Cryptographic algorithms for securing digital documents: AES implementation in PHP. International Journal of Computer Science and Engineering, 24(6), 415–425. https://doi.org/10.1016/j.ijcse.2022.09.014
Li, X. (2022). Iterative software development and security: Case study with RUP in AES implementations. Journal of Software Development and Security, 33(1), 47–58. https://doi.org/10.1109/JSD.2022.1455890
Nugrahantoro, T., Permadi, S., & Wicaksono, A. (2020). Optimasi keamanan informasi menggunakan algoritma AES dengan mode cipher block chaining (CBC). Jurnal Keamanan Siber dan Kriptografi, 6(3), 54–67.
Patel, S., Mistry, H., & Shah, R. (2021). Integrating AES encryption in database systems for document security. Journal of Database Security, 19(2), 167–181. https://doi.org/10.1109/JDS.2021.050245
Prasetyo, A., & Pradana, H. (2023). Implementasi algoritma AES-128 dalam pengamanan file di institusi pendidikan. Jurnal Teknologi Informasi dan Enkripsi Data, 14(2), 90–108.
Pratama, D., & Desyani, R. (2022). Implementasi kriptografi file dokumen berbasis web menggunakan metode AES untuk meningkatkan keamanan dan aksesibilitas. Jurnal Sistem Informasi dan Keamanan Digital, 10(4), 212–228.
Rodríguez, J., Sánchez, P., & García, M. (2021). Testing encryption algorithms: A focus on black-box testing methodologies. Software Testing, Verification & Reliability, 31(8), 1485–1498. https://doi.org/10.1002/stvr.1867
Roihan, A., Supriyanti, D., Aziz, M. A., & Hunaepi, A. (2024). PERANCANGAN PURWARUPA SISTEM KEAMANAN KUNCI PINTU BERBASIS PENGENALAN WAJAH. Journal of Innovation And Future Technology (IFTECH), 6(2), 234–242. https://doi.org/10.47080/iftech.v6i2.3415
Singh, R., & Shukla, V. (2023). Analysis of AES algorithm performance and its security with modern threats. Journal of Cryptographic Engineering, 11(3), 52–65. https://doi.org/10.1016/j.jce.2023.01.003
Sobolev, A., Ivashchenko, O., & Kolesnichenko, A. (2020). A review of iterative models in software development with a focus on RUP. Software Engineering Practice, 44(9), 1021–1034. https://doi.org/10.1109/SEP.2020.054417
Wei, X., & Zhang, Z. (2022). Black-box testing strategies for web application security. Journal of Software Testing, 34(5), 198–211. https://doi.org/10.1016/j.jst.2022.01.015
Zhang, Y. (2023). AES-128 and its application in secure document storage systems. Journal of Cyber Security, 19(3), 101–113. https://doi.org/10.1016/j.jcyb.2023.07.002