Sinkron : Jurnal dan Penelitian Teknik Informatika
Vol. 8 No. 2 (2024): Article Research Volume 8 Issue 2, April 2024

Optimizing Attendance Data Security by Implementing Dynamic AES-128 Encryption

Nuzula, Mukhsin (Unknown)
Away, Yuwaldi (Unknown)
Kahlil, Kahlil (Unknown)
Novandri, Andri (Unknown)



Article Info

Publish Date
31 Mar 2024

Abstract

The protection of data security is crucial, particularly when dealing with the transmission of sensitive information through communication networks. This article explores the Advanced Encryption Standard 128-bit (AES-128) algorithm as an effective and secure cryptographic solution. The paper proposes the dynamic development of the AES-128 cryptography method by implementing a dynamic key to enhance the security of employee attendance data. The dynamic key involves changing the encryption key every minute, providing an additional security layer and reducing the risk of decryption by unauthorized parties. Test results indicate that the dynamic AES-128 encryption algorithm demonstrates optimal performance. The consecutive encryption and decryption speeds for sending attendance data are 14656.78 bit/s and 21898.21 bit/s, respectively. The consistent duration of the encryption and decryption processes, at 6.66ms and 2.44ms, along with an Avalanche Effect rate of 50.73% and an Entropy of 6.67 bit/symbol, emphasizes the algorithm’s efficiency and stability. This research not only reinforces the desired level of security but also outperforms several previous studies. Analyzed performance data indicates that this method is not only efficient but also stable in maintaining data security, addressing significant variations in data length. Thus, the implementation of dynamic AES-128 cryptography in attendance systems provides a significant advantage in addressing information security challenges in the current digital era.

Copyrights © 2024






Journal Info

Abbrev

sinkron

Publisher

Subject

Computer Science & IT

Description

Scope of SinkrOns Scientific Discussion 1. Machine Learning 2. Cryptography 3. Steganography 4. Digital Image Processing 5. Networking 6. Security 7. Algorithm and Programming 8. Computer Vision 9. Troubleshooting 10. Internet and E-Commerce 11. Artificial Intelligence 12. Data Mining 13. Artificial ...