IMPLEMENTASI KEAMANAN DOKUMEN RAHASIA DESA MANGGIS MENGGUNAKAN METODE AES

Authors

  • Mico Alehandro Universitas Islam Kadiri Kediri Author
  • Harso Kurniadi Universitas Islam Kadiri Author
  • Yudo Bismo Utomo Universitas Islam Kadiri Author

Keywords:

AES Method, Cryptography, Document Security

Abstract

The focus of data security in the digital age is primarily on data security loopholes that can be exploited by unscrupulous and irresponsible parties. Cryptography is a science that studies techniques for securing information, and one of these techniques is maintaining the confidentiality of documents in Manggis village. However, Manggis village does not yet have an application used to secure important confidential documents, like finances, population data, and local policies. The document needs to be secured in order to prevent abuse and invasion of privacy. To secure important documents in Manggis village, one popular cryptographic algorithm is the AES method, or Advanced Encryption Standard method. The fact that the Advanced Encryption Standard is an extremely strong encryption standard that makes it difficult for careless parties to find security flaws is one of its benefits. Documents holding sensitive and vital information can be encrypted using the AES technique to prevent careless parties from reading them. Because it is extremely safe and difficult to breach security, the researcher decided to employ the AES technique to secure papers in Manggis Village.

Downloads

Download data is not yet available.

References

Y. B. Utomo and D. Erwanto, “Analisa Teknik Steganografi dan Steganalysis Pada File Multimedia Menggunakan Net Tools dan Hex Editor,” 2019.

Firda Nurelia Syah Putri, Yudo Bismo Utomo, and Harso Kurniadi, “Analisa Celah Keamanan Pada Website Pemerintah Kabupaten Kediri Menggunakan Metode Penetration Testing Melalui Kali Linux,” Online, 2023.

M. Azhari, D. I. Mulyana, F. J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” Jurnal Pendidikan Sains dan Komputer, vol. 2, no. 01, pp. 163–171, 2022, doi: 10.47709/jpsk.v2i01.1390.

A. Saepudin, R. Aryanti, E. Fitriani, and D. Ardiansyah, “Perancangan Sistem E-Commerce Menggunakan Model Rapid Application Development Pada Pengurus Cabang Judo Karawang,” Paradigma - Jurnal Komputer dan Informatika, vol. 23, no. 1, pp. 27–34, 2021.

I. A. R. Simbolon, I. Gunawan, I. O. Kirana, R. Dewi, and S. Solikhun, “Penerapan Algoritma AES 128-Bit dalam Pengamanan Data Kependudukan pada Dinas Dukcapil Kota Pematangsiantar,” Journal of Computer System and Informatics (JoSYC), vol. 1, no. 2, pp. 54–60, 2020.

M. M. Lucini, P. J. Van Leeuwen, and M. Pulido, “Model error estimation using the expectation maximization algorithm and a particle flow filter,” SIAM-ASA Journal on Uncertainty Quantification, vol. 9, no. 2, pp. 681–707, 2021, doi: 10.1137/19M1297300.

I. M. W. Gede Wisnu Bhaudhayana, “Implementasi Algoritma Kriptografi Aes 256 Dan Metode Steganografi Lsb Pada Gambar Bitmap,” Angewandte Chemie International Edition, 6(11), 951–952., vol. 3, no. 1, pp. 10–27, 2018.

Y. Christian and Heri, “Penerapan Metodologı Waterfall dalam Pengembangan Communıty Based Websıte untuk Membagıkan Cerıta Hıdup dan Kebıjaksanaan Manula,” COMBINES: Conference on Management, Business, Innovation, Education and Social Science, vol. 1, no. 1, pp. 616–622, 2021.

D. W. Hoffman, “No 主観的健康感を中心とした在宅高齢者における 健康関連指標に関する共分散構造分析Title”.

Istianah, Hapipah, and E. Oktaviana, “3 1,2,3,” Jurnal Kreaktifitas Pengabdian Kepada Masyarakat (PKM), vol. 3, no. April, pp. 119–126, 2020.

R. V. H. Chandra, A. Kusyanti, and M. Data, “Analisis Performa Proses Enkripsi dan Dekripsi Menggunakan Algoritme AES-128 Pada Berbagai Format File,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 3, no. 1, pp. 481–486, 2019.

Downloads

Published

2024-08-26

How to Cite

[1]
M. Alehandro, Harso Kurniadi, and Yudo Bismo Utomo, “IMPLEMENTASI KEAMANAN DOKUMEN RAHASIA DESA MANGGIS MENGGUNAKAN METODE AES”, neiit, vol. 1, no. 1, pp. 604–614, Aug. 2024, Accessed: Jul. 04, 2025. [Online]. Available: http://ojs.ft.uniska-kediri.ac.id/index.php/neiit/article/view/65

Most read articles by the same author(s)

Similar Articles

11-20 of 30

You may also start an advanced similarity search for this article.