International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 11, November 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Development And Implementation Of The Rijndael Algorithm And Base-64 Advanced Encryption Standard (AES) For Website Data Security

[Full Text]



Fathurrahmad, Ester



Security Analysis; Algorithm Development; Advanced Encryption Standard (AES); Rijndael; Base-64; Security Data; Website.



The security of a website is absolutely analyzed and improvements are made to the web development framework to prevent data leakage, this study analyzes and modifies the Advanced Encryption Standard (AES) algorithm which can later be implemented on a website and tested and compared with the Advanced Encryption Standard (AES) algorithm. will be modified with the model that the researcher plans. The research objectives were, among others, to develop an algorithm that was modified from Base64 and Rijndael. The research stages consisted of a survey, implementation, and comparative analysis of the proposed modified algorithm. The results of research carried out through the encryption and decryption process by integrating the Base64 and AES Rijndael algorithms with the proposed algorithm so that it is known to improve data security better. If it is seen from the level of efficiency that the proposed algorithm can be used as a substitute for the Base64 algorithm. Whereas in the implementation, the proposed algorithm speed has good speed, it can be seen from the encryption process and the description and the resulting bits do not have a significant impact.



[1] Abood, O. G., & Guirguis, S. K. (2018). A survey on cryptography algorithms. International Journal of Scientific and Research Publications, 8(7), 410-415.
[2] Canright, D. (2005, August). A very compact S-box for AES. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 441-455). Springer, Berlin, Heidelberg.
[3] Du, P., Kibbe, W. A., & Lin, S. M. (2007). nuID: a universal naming scheme of oligonucleotides for illumina, affymetrix, and other microarrays. Biology direct, 2(1), 16.
[4] Fathurrahmad, F., Yusuf, S., Iqbal, T., & Abdus, S. I. I., (2019). Source Code Library (SCL): Software Development Learning Application. International Journal of Scientific & Technology Research, 8(11), 175-182
[5] Hayati, N., Budiman, M.A. and Sharif, A., (2017). Implementasi Algoritma RC4A dan MD5 untuk Menjamin Confidentiality dan Integrity pada File Teks. SinkrOn, 1(2).
[6] Padede, A.M.H., Manurung, H. and Filina, D., (2017). Algoritma Vigenere Cipher Dan Hill Cipher Dalam Aplikasi Keamanan Data Pada File Dokumen. Jurnal Teknik Informatika Kaputama, 1(1), pp.26-33.
[7] Prasetyadi, G., Hantoro, U. T., Mutiara, A. B., Muslim, A., & Refianti, R. (2019, October). Heresy: A Serverless Web Application to Store Compressed and Encrypted Document in the Form of URL. In 2019 Fourth International Conference on Informatics and Computing (ICIC) (pp. 1-5). IEEE.
[8] Prayitno, A. and Nurdin, N., (2017). Analisa Dan Implementasi Kriptografi Pada Pesan Rahasia Menggunakan Algoritma Cipher Transposition. Jurnal Elektronik Sistem Informasi dan Komputer, 3(1), pp.1-10.
[9] Putra, M.D., (2018). Enkripsi Dan Dekripsi Gambar Dengan Menggunakan Perpaduan Algoritma Base64 Dan RC4. Semnasteknomedia Online, 6(1), pp.2-14.
[10] Santoso, H. and Fakhriza, M.F.M., (2018). Perancangan Aplikasi Keamanan File Audio Format Wav (Waveform) Menggunakan Algoritma RSA. Algoritma: Jurnal Ilmu Komputer Dan Informatika, 2(1).
[11] Selent, D. (2010). Advanced encryption standard. Rivier Academic Journal, 6(2), 1-14.
[12] Singh, G. (2013, December). Modified Vigenere encryption algorithm and its hybrid implementation with Base64 and AES. In 2013 2nd International Conference on Advanced Computing, Networking and Security (pp. 232-237). IEEE.
[13] Wali, M., Akbar, R., Iqbal, T., & Al-Bahri, F. P. (2019). Development Of An Android-Based Tourism Guide (A Case Study: Sabang City, Indonesia). International Journal of Scientific and Technology Research, 8(11), 887-893.
[14] Wali, M., Ahmad, L., Akbar, R., & Abdus, S. I. I., (2020). Source Code Library (SCL): Software Development Learning Application. International Journal of Scientific & Technology Research, 8(11), 175-182.
[15] Zulham, M., Kurniawan, H. and Rahmad, I.F., (2017, October). Perancangan Aplikasi Keamanan Data Email Menggunakan Algoritma Enkripsi RC6 Berbasis Android. In Seminar Nasional Informatika (SNIf) (Vol. 1, No. 1, pp. 96-101).