1Department of Informatics Engineering, Universitas Dian Nuswantoro, Indonesia
2Department of Informatics Systems, Universitas Dian Nuswantoro, Indonesia
3Department of Visual Communication Design, Universitas Dian Nuswantoro, Indonesia
4 Department of Computer Science, Northern Technical University, Iraq
BibTex Citation Data :
@article{JMASIF75091, author = {Reza Arista Pratama and Eko Hari Rachmawanto and Candra Irawan and Lalang Erawan and Deddy Award Widya Laksana and Rabei Raad Ali}, title = {Performance Analysis Cryptography Using AES-128 and Key Ecnryption Based on MD5}, journal = {Jurnal Masyarakat Informatika}, volume = {16}, number = {2}, year = {2025}, keywords = {Cryptography; AES; MD-5; file; execution time; Avalanche effect; Entropy;}, abstract = { The rampant misuse of data theft has created data security techniques in cryptography. Cryptography has several algorithms that are very strong and difficult to crack, including the AES (Advanced Encryption Standard) algorithm consisting of 128 bits, 192 bits, and 256 bits which have been proven resistant to conventional linear analysis attacks and differential attacks, then there is the MD-5 algorithm (Message-Digest algorithm 5) which is a one-way hash function by changing data with a long size and inserting certain data in it to be recovered. If the two are combined, it is more difficult to crack, therefore to determine its performance, this study conducted a combination experiment of AES-128 with a key encrypted by MD-5 with its avalanche effect test, encryption and decryption execution time, and entropy value of encryption. The types of documents for testing are files with the extensions .docx, .txt, .pptx, .pdf, and .xlsx. After conducting tests on document files obtained from the processing time test, it shows that .txt and .pptx documents dominate with a fast process, while the longest process is obtained by .xlsx and .docx documents for all test files, then the avalanche effect test with an average of 98% and the entropy test is classified as good between values 3 - 7 which are close to value 8. This proves that the combination of the AES - 128 algorithm with the MD-5 key can be used as an alternative in securing documents with stronger security with standard processing time. }, issn = {2777-0648}, pages = {216--228} doi = {10.14710/jmasif.16.2.75091}, url = {https://ejournal.undip.ac.id/index.php/jmasif/article/view/75091} }
Refworks Citation Data :
Article Metrics:
Last update:
Last update: 2025-08-10 19:04:20
The authors who submit the manuscript must understand that the article's copyright belongs to the author(s) if accepted for publication. However, the author(s) grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors should also understand that their article (and any additional files, including data sets, and analysis/computation data) will become publicly available once published under that license. By submitting the manuscript to Jmasif, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. Jmasif will not be held responsible for anything arising because of the writer's internal dispute. Jmasif will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. Jmasif allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and Jmasif to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.