Implementation Aes-128 Encryption For Enhanced Data Security In Central Sulawesi Provincial Inspectorate

Authors

  • Imam Wahyudi Universitas Tadulako
  • Syahrullah Universitas Tadulako
  • Dwi Shinta Anggreni Universitas Tadulako
  • Rahmah Laila Universitas Tadulako

DOI:

https://doi.org/10.26877/asset.v6i3.560

Keywords:

Advanced Encrypt on Standard (AES)128, Data security, encryption and description, report

Abstract

One technique to secure data is to use the Advanced Encrypt on Standard (AES) 128 method. The Advanced Encrypt on Standard (AES) method can be applied in improving data security, especially at the Central Sulawesi Provincial Inspectorate. The data in question are audit reports of BOS funds (School Operational Assistance), reports of special investigations into violations of regional finances and reports of violations of civil servant discipline (PNS). The data must have a high level of security, so that it is not easily known by irresponsible parties and will have a negative impact and be misused. The conclusion in this study was obtained that, the AES-128 algorithm can be used as an alternative to the process of improving data security, namely by encryption and decryption. The results of encryption can be guaranteed as long as the symmetry key encryption is not leaked to irresponsible parties

References

Cristy, N., &; Riandari, F. (2021). Niolinda Cristy 1 , Fristi Riandari 2 [Implementation of Advanced Encryption Standard (AES 128 bit) method to secure financial data. 4(2), 75.

Clivent gerhard sondakh et al. (2024), Implementation of data layer in Blockchain network using SHA256 Hashing Algorithm

Hermawan, A., Halim, A., Susilawati, D., Putri, I. A., Informatics, J. T., Science, F., Technology, D., &; Dharma, U. B. (n.d.). Journal of Informatics and Software Engineering Implementation of Advanced Encryption Standard and Caesar Cipher Algorithms on Encrypted Messages.

Muharram, F. (2018). Algorithm analysis on the process of encrypting and decrypting files using advanced encryption standards. Proceedings of the National Seminar on Computer Science and Information Technology, 3(2).

Nurnaningsih, D., &; Permana, A. A. (2018). Design data security applications with Advanced Ency Standard (AES) algorithms. Journal of Informatics Engineering, 11(2), 177–186. https://doi.org/10.15408/jti.v11i2.7811

Prameshwari, A., &; Literature, N. P. (2018). Implementation of Advanced Encryption Standard (AES) 128 algorithm for encrypting and decrypting document files. Explore Informatics, 8(1), 52. https://doi.org/10.30864/eksplora.v8i1.139

Suranta, A. I., Virgia, D., &; Sakti, S. Y. (2022). Application of AES (Advance Encryption Standard) 128 Algorithm for Document Encryption at PT. Mount Geulis Eternal Beauty. SKANIKA: Computer Systems and Information Engineering, 5(1), 1–10.

R. Tullah, M. I. Dzulhaq, and Y. Setiawan, "Design of File Cryptography Applications with Advanced Encryption Standard (AES) Algorithm Method," J. Sisfotek Glob., vol. 6, no. 2, pp. 24–30, 2016.

G. Gumira, Ernawati, and A. Erlanshari, "Implementation of Advanced Encryption Standard (AES) and Message Digest 5 (MD5) methods on document encryption (Case Study of LPSE UNIB)," J. Recursive, Vol. 4, No. 3, pp. 277–287, 2016.

V.Novianty, J. Algorithm, S. Tinggi, T. Garut, and I. Introduction, "Securing Cooperative Financial Databases," J. Algorithms. High-tech colonel. Arrowroot, vol. Vol. 12, pp. 1–7, 2015

A. Prameshwari and N. P. Sastra, "Implementation of Advanced Encryption Standard (AES) 128 Algorithm for Encryption and Decryption of Document Files," Ekslorra Inform.,vol. 8, no. 1, p. 52, 2018, DOI: 10.30864/explora.v8i1.139.

D. S. Purnia, M. F. Adiwisastra, H. Muhajir, and D. Supriadi, "Digital Divide Measurement Using Website-Based Descriptive Method," EVOLUTION J. Science and Manaj., Vol. 8, No. 2, Sep 2020, doi: 10.31294/evolution.v8i2.8942.

T. Arianti, A. Fa'izi, S. Adam, and M. Wulandari, "Library Information System Design Using UML (Unified Modelling Language) Diagrams," vol. 1, 2022.

M. Syarif and E. B. Pratama, "Analysis of Blackbox Testing Software Test Methods and UML Diagram Modeling in Veterinary Service Applications Developed with Waterfall Models," vol. 5, no. 2, 2021.

HS, S. COMPUTER SECURITY GUIDE Security. https://www.academia.edu/31730328/PANDUAN_KEAMANAN_KOMPUTER_K eamanan_komputer

Wirdasari, d. Get to know computer security techniques and attack models (Security Attack Models). Safe. Attack model. 4, 111–119 (2008).

A. Prameshwari and N. P. Sastra, "Implementation of Advanced Encryption Standard (AES) 128 Algorithm for Encryption and Decryption of Document Files," Eksplora Informatika, vol. 8, no. 1, p. 52,Sep. 2018, doi: 10.30864/eksplora.v8i1.139

Umniy Salamah, Andi Purnomo "Cooperative Savings and Loans Application at PT. Mobile-Based Primantara Using FIFO Algorithm" Journal of SISFOKOM (Information Systems and Computers), Volume 09, Number 01, PP 51 – 58

Fahry Fadila Risky, Darjat Saripurna, Iskandar Zulkarnain "Design of Solar Tracking Panel System to Determine the Direction of Solar Panels on the Sun with Microcontroller-Based Fuzzy Method"

Primartha, Rifkie. January 2013. The implementation of encryption and decryption of files uses the Advanced Encryption Standard (AES) algorithm. Journal of Computer Science Research and Applications, Vol. 2, No. 1: 13-18.

Downloads

Published

2024-06-11

Issue

Section

Articles