Implementasi Algoritma AES-256 Berbasis Web untuk Pengamanan Dokumen Digital di CV. Karya Eksklusif Nusantara
DOI:
https://doi.org/10.35760/ik.2025.v30i3.60Kata Kunci:
AES-256, CBC Mode, Document Encryption, Web-Based System, Data SecurityAbstrak
In the digital era, corporate document security has become a major challenge due to the increasing risk of data breaches and cyberattacks. CV. Karya Eksklusif Nusantara, a company that provides goods and services, still stores important documents in digital formats such as .pdf, .docx, and .xlsx without a special protection system, making them vulnerable to illegal access or data corruption. This study aims to implement the AES-256 algorithm in CBC mode on a web-based system to encrypt and decrypt digital documents, as well as to test its performance based on different file sizes. This research uses the Waterfall method, which includes stages of data collection through interviews and literature review, system requirement analysis, design using UML, implementation with the Laravel framework, and black-box testing. The result of the study is a web-based application capable of securely encrypting and decrypting digital documents. Performance testing shows that the encryption and decryption operations are very fast, with an average encryption time of 0.2924 seconds and a decryption time of 0.3309 seconds, while functional testing ensures that all functions work according to requirements.
Referensi
[1] A. M. Alenezi, “Cloud Security Assurance: Strategies For Encryption In Digital Forensic Readiness A Preprint,” 2024. doi: https://doi.org/10.48550/arXiv.2403.04794.
[2] M. A. Al Hilmi and R. K. Yunan, “Pengujian Keamanan Fitur Upload File Pada Sistem Aplikasi Web,” Jurnal Informatika: Jurnal pengembangan IT (JPIT), vol. 7, no. 1, Jan. 2022, doi: https://doi.org/10.30591/jpit.v7i1.3336.
[3] S. Saeed, S. A. Altamimi, N. A. Alkayyal, E. Alshehri, and D. A. Alabbad, “Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations,” Aug. 01, 2023, Multidisciplinary Digital Publishing Institute (MDPI). doi: 10.3390/s23156666.
[4] S. Liu, “Digital Transformation and Data Privacy and Security: Challenges and Strategies for Enterprises,” Law and Economy, vol. 4, no. 5, pp. 65–70, Jul. 2025, doi: 10.63593/le.2788-7049.2025.06.007.
[5] R. D. Anggaini Puspita, P. Dahlian Persadha, and Mulyadi, “Analisis Ancaman Serangan Siber Pada Infrastruktur Informasi Vital Terhadap Stabilitas Keamanan Nasional,” Syntax Literate, vol. 10, no. 5, May 2025, doi: https://doi.org/10.36418/syntax-literate.v10i5.59084.
[6] Tanti Kirana Utami, Kayla Andini Putri, Salsa Octaviani Suryanto, and Fina Asriani, “Personal Data Breach Cases In Indonesia : Perspective Of Personal Data Protection Law,” Journal Customary Law, vol. 2, no. 2, p. 21, Feb. 2025, doi: https://doi.org/10.47134/jcl.v2i2.3742.
[7] Y. W. Ghalib et al., “Analisis Perkembangan Keamanan Siber Dampak Dari Kebocoran Data Pusat Data Nasional Sementara 2 Surabaya,” JISCO(Journal of Informaton System and Computng), vol. 2, 2024, doi: https://doi.org/10.30631/jisco.v2i1.100.
[8] B. S. Deva and R. Jayadi, “Analisis Risiko dan Keamanan Informasi pada Sebuah Perusahaan System Integrator Menggunakan Metode Octave Allegro,” Jurnal Teknologi dan Informasi (JATI), vol. 12, no. 27, p. 12, 2022, doi: 10.34010/jati.v12i2.
[9] T. Kurahmadan, “Analisa Dan Perancangan Sistem Informasi Kearsipan Berbasis Digital,” Jurnal Teknologi Informasi, vol. 10, Dec. 2024, doi: https://doi.org/10.52643/jti.v10i2.5705.
[10] E. Sutanty, M. B. Siregar, and E. Setiyaningsih, “Implementasi Feistel Block Cipher Dalam Enkripsi File Berbentuk Teks,” Jurnal Ilmiah Informatika Komputer, vol. 26, no. 2, pp. 136–148, 2021, doi: 10.35760/ik.2021.v26i2.4238.
[11] “Advanced Encryption Standard (AES),” May 2023. doi: 10.6028/NIST.FIPS.197-upd1.
[12] B. Schneier, Applied cryptography : protocols, algorithms, and source code in C. Wiley, 2015.
[13] W. Prabowo and N. Anwar, “Pengujian Model Simulasi Efek Avalanche Kriptografi Simetris Algoritma AES 128-bit, Mode ECB dan CBC,” Mar. 2025, doi: 10.37817/ikraith-informatika.v9i1.
[14] A. Ridho and Moh. A. Romli, “Sistem Pengamanan Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES-256),” Jurnal Informatika Teknologi dan Sains (JINTEKS), Nov. 2024, doi: 10.51401/jinteks.v6i4.4887.
[15] S. Manullang, Allwine, and Jakaria Sembiring, “Pengamanan Data File Dokumen Menggunakan Algoritma Advanced Encryption Standard Mode Chiper Block Chaining,” Antivirus : Jurnal Ilmiah Teknik Informatika, vol. 17, no. 1, pp. 53–67, Jun. 2023, doi: 10.35457/antivirus.v17i1.2811.
[16] F. Baso and N. Anriani, “Implementasi Teknik Kriptografi dengan Metode AES 256 untuk Keamanan File,” INTEC Journal: Information Technology Education Journal, vol. 3, no. 3, 2024, doi: https://doi.org/10.59562/intec.v3i3.5525.
[17] M. S. Affandi, R. Setiyanto, and M. Za, “Analisis Perbandingan Sistem Bengkel Berbasis Dekstop dan Web Menggunakan Metode User Acceptance Testing,” JSAI : Journal Scientific and Applied Informatics, vol. 08, no. 2, 2025, doi: 10.36085.
[18] S. A. Syafrudin, I. Wahyuni, and Oktaviani, “Penerapan Metode Waterfall Pada Sistem Otomatisasi Website Pembelajaran Smp Kelas 9,” Jurnal Ilmiah Informatika Komputer, vol. 28, no. 2, pp. 88–99, 2023, doi: 10.35760/ik.2023.v28i2.8030.
[19] S. Supiyandi, M. Zen, C. Rizal, and M. Eka, “Perancangan Sistem Informasi Desa Tomuan Holbung Menggunakan Metode Waterfall,” JURIKOM (Jurnal Riset Komputer), vol. 9, no. 2, p. 274, Apr. 2022, doi: 10.30865/jurikom.v9i2.3986.
[20] D. S. Purwanti, M. Fadli, M. Surono, and E. R. Susanto, “Perancangan Penerapan Algoritma Kriptografi Aes 256 Untuk Keamanan Database Aplikasi Manajemen Siswa,” STORAGE – Jurnal Ilmiah Teknik dan Ilmu Komputer, vol. 4, no. 2, pp. 111–119, May 2025, doi: https://doi.org/10.55123/storage.v4i2.5237.
[21] M. J. Dworkin, “Recommendation for Block Cipher Modes of Operation,” Gaithersburg, MD, 2001. doi: 10.6028/NIST.SP.800-38a.
[22] B. Dos, S. Rocha, J. A. M. Xexéo, and R. H. Torres, “Artificial Intelligence Applied to the Identification of Block Ciphers under CBC Mode,” 2023. doi: 10.5120/ijca2023923114.
[23] L. N. Hayati et al., “JPM (Jurnal Pemberdayaan Masyarakat) Pemberdayaan Pengrajin Kana Tojeng Melalui Pemasaran E-Commerce Produk Anyaman Serat Lontara Songko Guru Desa Bontokassi,” 2025, doi: 10.21067/jpm.v10i2.12742.
[24] G. V. Dewaji, D. R. Arifatno, S. E. Pratiwi, and Rogayah, “Penerapan Framework Laravel Pada Pembuatan Aplikasi Sewa Properti ‘Rentify’ Dengan Metode Ux System Usability Scale (SUS),” Jurnal Ilmiah Informatika Komputer, vol. 29, no. 2, pp. 197–211, 2024, doi: 10.35760/ik.2024.v29i2.12075.
[25] A. Khaliq, S. Batubara, M. Syaula, and Y. E. Lubis, “Perancangan Sistem Karir Berbasis Web Menggunakan Framework Laravel,” Dec. 2022. doi: 10.30645/brahmana.v4i1A.144.
[26] M. A. Syaifullah, L. N. Hayati, and L. B. Ilmawan, “Application of the First Come First Served Method in the Mobile-Application System,” bit-Tech, vol. 8, no. 2, pp. 2653–2662, Dec. 2025, doi: 10.32877/bt.v8i2.3331.
[27] F. Kawakib Kartono et al., “Pengujian Black Box Testing Pada Sistem Website Osha Snack: Pendekatan Teknik Boundary Value Analysis,” Dec. 2024. doi: https://doi.org/10.53863/kst.v6i02.1407.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 Jurnal Ilmiah Informatika Komputer

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.
Download Journal Template (DOCX)