Data Security using 128-bit Advanced Encryption Standard Algorithm

Authors

  • Virdyra Tasril  
  • Andysah Putera Utama Siahaan  

Keywords:

AES, Encryption, Decryption, Algorithm

Abstract

The development of computer and telecommunications technology has experienced the significant change in progress. It can be seen that technology has become a necessity because technological advances can accomplish tasks quickly, accurately, and efficiently. In line with the development of these technologies, it increasingly changes the way people communicate. There needs to be security protection to protect data from the threat of wild parties. Cryptography is the right method to secure data. One method that can be used is the Advanced Encryption Standard (AES). This method is an excellent classical cryptographic algorithm that can be used to identify data. AES algorithm is a symmetric ciphertext block that can encrypt and decrypt information quickly. Encryption changes data that can no longer be read called ciphertext; instead, decryption is changing the ciphertext data into the original form that we know as plaintext. The AES algorithm has several key models such as 128, 192, and 256 bits to encrypt and decrypt data on 128-bit message blocks. This study uses a 128-bit key. AES encryption results can be trusted as one of the fast and powerful encryption methods.

References

  1. A Lubis dan A. P. U. Siahaan, "Network Forensic Application in General Cases," IOSR J. Comput. Eng., vol. 18, no. 6, hal. 41-44, 2016.
  2. W Stallings, Cryptography and Network Security Principles and Practices, 4th ed. Prentice Hall, 2005.
  3. V Tasril, M. B. Ginting, Mardiana, dan A. P. U. Siahaan, "Threats of Computer System and its Prevention," Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, hal. 448-451, 2017.
  4. Hariyanto dan A. P. U. Siahaan, "Intrusion Detection System in Network Forensic Analysis and," IOSR J. Comput. Eng., vol. 18, no. 6, hal. 115-121, 2016.
  5. H Ming dan S. LiZhong, "A New System Design of Network Invasion Forensics," in 2009 Second International Conference on Computer and Electrical Engineering, 2009, hal. 596-599.
  6. G Singh dan Supriya, "A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security," Int. J. Comput. Appl., vol. 6, no. 19, hal. 33-38, 2013.
  7. J Daernen dan V. Rijrnen, The Design of Rijndael AES - The Advanced Encryption Standard. Berlin: Springer, 2002.
  8. A P. U. Siahaan, How to Code: Advanced Encryption Standard in C#. Medan: Fakultas Ekonomi Universitas Panca Budi, 2018.
  9. A Putera Utama Siahaan, E. Elviwani, dan B. Oktaviana, "Comparative Analysis of RSA and ElGamal Cryptographic Public-key Algorithms," in Proceedings of the Joint Workshop KO2PI and The 1st International Conference on Advance & Scientific Innovation, 2018.
  10. B. Forouzan, Cryptography and Network Security. New York, NY, USA: McGraw-Hill, 2006.
  11. Sukriadi Shafar, "Pengertian Dan Contoh Kriptografi dengan Proses Enkripsi dan Dekripsi," On Digital Forensics, 2016. [Daring]. Tersedia pada: http://ondigitalforensics.weebly.com/cryptography/pengertian-dan-contoh-kriptografi-dengan-proses-enkripsi-dan-dekripsi#.W7w6mxMzZZ0.
  12. Y. Kumar, R. Munjal, dan H. Sharma, "Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures," Int. J. Comput. Sci. Manag. Stud., vol. 11, no. 3, hal. 60-63, 2011.
  13. N. Aleisa, "A Comparison of the 3DES and AES Encryption Standards," Int. J. Secur. Its Appl., vol. 9, no. 7, hal. 241-246, Jul 2015.
  14. A. Arya dan M. Malhotra, "Effective AES Implementation.," Int. J. Electron. Commun. Eng. Technol., vol. 7, no. 1, hal. 01-09, 2016.
  15. S. S. Shirabadagi dan S. Nadagoud, "A new encryption methodology of aes algorithm using high speed s-box.," Int. J. Eng. Res. Electron. Commun. Eng., vol. 4, no. 7, hal. 37-42, 2017.

Downloads

Published

2018-10-30

Issue

Section

Research Articles

How to Cite

[1]
Virdyra Tasril, Andysah Putera Utama Siahaan, " Data Security using 128-bit Advanced Encryption Standard Algorithm, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 10, pp.198-205, September-October-2018.