skip to main content

Performance Analysis Cryptography Using AES-128 and Key Ecnryption Based on MD5

1Department of Informatics Engineering, Universitas Dian Nuswantoro, Indonesia

2Department of Informatics Systems, Universitas Dian Nuswantoro, Indonesia

3Department of Visual Communication Design, Universitas Dian Nuswantoro, Indonesia

4 Department of Computer Science, Northern Technical University, Iraq

View all affiliations
Received: 16 Jun 2025; Revised: 29 Jul 2025; Accepted: 31 Jul 2025; Published: 2 Aug 2025.
Open Access Copyright (c) 2025 The authors. Published by Department of Informatics Universitas, Diponegoro
Creative Commons License This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Citation Format:
Abstract
The rampant misuse of data theft has created data security techniques in cryptography. Cryptography has several algorithms that are very strong and difficult to crack, including the AES (Advanced Encryption Standard) algorithm consisting of 128 bits, 192 bits, and 256 bits which have been proven resistant to conventional linear analysis attacks and differential attacks, then there is the MD-5 algorithm (Message-Digest algorithm 5) which is a one-way hash function by changing data with a long size and inserting certain data in it to be recovered. If the two are combined, it is more difficult to crack, therefore to determine its performance, this study conducted a combination experiment of AES-128 with a key encrypted by MD-5 with its avalanche effect test, encryption and decryption execution time, and entropy value of encryption. The types of documents for testing are files with the extensions .docx, .txt, .pptx, .pdf, and .xlsx. After conducting tests on document files obtained from the processing time test, it shows that .txt and .pptx documents dominate with a fast process, while the longest process is obtained by .xlsx and .docx documents for all test files, then the avalanche effect test with an average of 98% and the entropy test is classified as good between values 3 - 7 which are close to value 8. This proves that the combination of the AES - 128 algorithm with the MD-5 key can be used as an alternative in securing documents with stronger security with standard processing time.
Fulltext View|Download
Keywords: Cryptography; AES; MD-5; file; execution time; Avalanche effect; Entropy;

Article Metrics:

  1. Pujitha Manepalli Dharani, “Security Enhancement Using Caesar Cipher,” International Journal of Research Publication and Reviews, vol. 3, no. 11, pp. 9–16, 2022, [Online]. Available: www.ijrpr.com
  2. R. Verma, A. Kumari, A. Anand, and V. S. S. Yadavalli, “Revisiting Shift Cipher Technique for Amplified Data Security,” Journal of Computational and Cognitive Engineering, 2022, doi: 10.47852/bonviewJCCE2202261
  3. I. Stepheng, C. A. Sari, E. H. Rachmawanto, and F. O. Isinkaye, “A Combination of Vigenere Cipher and Advanced Encryption Standard for Image Security,” Advance Sustainable Science Engineering and Technology, vol. 5, no. 3, p. 0230305, Oct. 2023, doi: 10.26877/asset.v5i3.17150
  4. S. M. Suhael, Z. A. Ahmed, and A. J. Hussain, “Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem,” Baghdad Science Journal, May 2023, doi: 10.21123/bsj.2023.8361
  5. S. M. Suhael, Z. A. Ahmed, and A. J. Hussain, “Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem,” Baghdad Science Journal, May 2023, doi: 10.21123/bsj.2023.8361
  6. O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, and A. A. M. Khalaf, “Efficient Combination of RSA Cryptography, Lossy, and Lossless Compression Steganography Techniques to Hide Data,” Procedia Comput Sci, vol. 182, pp. 5–12, 2021, doi: 10.1016/j.procs.2021.02.002
  7. F. Mushtaq Sher Ali and F. Hassan Sarhan, “Enhancing Security of Vigenere Cipher by Stream Cipher,” Int J Comput Appl, vol. 100, no. 1, pp. 975–8887, 2014
  8. M. Uthman Azlan and M. Shamian Zainal, “An IoT Based Home Security System With ESP32, Video Monitoring, and Blynk Integration,” vol. 5, no. 1, pp. 238–244, 2024, doi: 10.30880/peat.2024.05.01.024
  9. A. Susanto, D. R. I. Moses Setiadi, E. H. Rachmawanto, C. A. Sari, R. R. Ali, and I. U. Wahyu Mulyono, “Dual Security Method for Digital Image using HBV Encryption and Least Significant Bit Steganography,” in Journal of Physics: Conference Series, Institute of Physics Publishing, May 2019. doi: 10.1088/1742-6596/1201/1/012024
  10. B. Deepa, V. Maheswari, and V. Balaji, “An Efficient Cryptosystem Using Playfair Cipher Together with Graph Labeling Techniques,” in Journal of Physics: Conference Series, IOP Publishing Ltd, Jul. 2021. doi: 10.1088/1742-6596/1964/2/022016
  11. K. Prasad and H. Mahato, “Cryptography using generalized Fibonacci matrices with Affine-Hill cipher,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 8, pp. 2341–2352, Nov. 2022, doi: 10.1080/09720529.2020.1838744
  12. K. Prasad and H. Mahato, “Cryptography using generalized Fibonacci matrices with Affine-Hill cipher,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 8, pp. 2341–2352, 2022, doi: 10.1080/09720529.2020.1838744
  13. C. A. Sari, G. Ardiansyah, D. R. I. Moses Setiadi, and E. H. Rachmawanto, “An improved security and message capacity using AES and Huffman coding on image steganography,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 17, no. 5, pp. 2400–2409, 2019, doi: 10.12928/TELKOMNIKA.v17i5.9570
  14. E. Hari Rachmawanto et al., “Testing Data Security Using a Vigenere Cipher Based on the QR Code,” Computer Network, Computing, Electronics, and Control Journal, vol. 8, no. 4, pp. 701–708, 2023, doi: 10.22219/kinetik.v8i4.1734
  15. L. Khakim, M. Mukhlisin, and A. Suharjono, “Analysis of password after encryption by using the combination of AES256 and MD5 algorithm methods,” in AIP Conference Proceedings, American Institute of Physics, Apr. 2024, p. 030023. doi: 10.1063/5.0198840
  16. E. H. Rachmawanto, K. Prasetyo, C. A. Sari, I. M. S. De Rosal, and N. Rijati, “Secured PVD Video Steganography Method based on AES and Linear Congruential Generator,” in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), IEEE, Nov. 2018, pp. 163–167. doi: 10.1109/ISRITI.2018.8864466
  17. K. Mohamed, M. N. M. Pauzi, F. H. H. M. Ali, and S. Ariffin, “Analyse On Avalanche Effect In Cryptography Algorithm,” in Proceedings of the International Conference on Sustainable Practices, Development and Urbanisation (IConsPADU 2021), 16 November 2021, Universiti Selangor (UNISEL), Malaysia, European Publisher, Oct. 2022, pp. 610–618. doi: 10.15405/epms.2022.10.57
  18. C. A. Sari, D. Wahyu Utomo, W. S. Sari, D. Sinaga, and M. Doheir, “An Enhancement of DES, AES Based on Imperceptibility Along With LSB,” in 2022 International Seminar on Application for Technology of Information and Communication (iSemantic), IEEE, Sep. 2022, pp. 150–155. doi: 10.1109/iSemantic55962.2022.9920444
  19. M. M. A Meftah, H. H. Yusef Sa’ad, Y. Al-Ashmoery, A.-M. H. Y. Saad, A. H. Y. Sa’d, and K. Alwesabi, “A Comparative Analysis of Cryptography Algorithms in Information Security,” in 2024 10th International Conference on Computing, Engineering and Design (ICCED), IEEE, Dec. 2024, pp. 1–6. doi: 10.1109/ICCED64257.2024.10983680
  20. J. Ayad, N. Qaddoori, and H. Maytham, “Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication,” Mesopotamian Journal of CyberSecurity, vol. 5, no. 1, pp. 178–186, Feb. 2025, doi: 10.58496/MJCS/2025/012

Last update:

No citation recorded.

Last update: 2025-08-10 19:04:20

No citation recorded.