Analisis Tingkat Keamanan File Dokumen Menggunakan Algoritma Advanced Encryption Standard (AES) Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.33752/inovate.v10i1.9251
Keamanan data pada file dokumen yang dikirim atau disimpan secara digital merupakan salah satu permasalahan di era teknologi saat ini. Terutama penggunaan platform digital untuk berbagi informasi dapat menjadi sasaran pencurian data, maka dibutuhkan solusi untuk melindungi kerahasiaan dan integritas data yang dikirimkan melalui jaringan internet. Salah satu cara yang dapat mengatasi permasalah ini adalah dengan menerapkan algoritma kriptografi yang aman dan mudah di implementasikan, salah satunya adalah Advanced Encryption Standard (AES) dengan panjang kunci 128 bit. AES merupakan algoritma yang telah terbukti keamanannya dan banyak digunakan untuk melindungi data dalam berbagai aplikasi. Dengan mengenkripsi file dokumen menggunakan AES, data yang dikirimkan melalui platform digital dapat terlindungi kerahasiannya dan mencegah akses dari pihak yang tidak sah, karena hanyak pihak yang memiliki kunci yang dapat mendekripsinya. Hasil uji keacakan ciphertext menggunakan shannon entropy didapatkan nilai entropy rata-rata sebesar 7.96. Nilai tersebut membuktikan bahwa tingkat keacakan dari ciphertext sangat tinggi, mendekati nilai maksimal 8 yang menghasilkan ciphertext yang acak, sehingga memperkuat keamanan data dari potensi analisis pola atau serangan kriptanalis.
Related Topics
- Type
- article
- Landing Page
- https://doi.org/10.33752/inovate.v10i1.9251
- https://ejournal.unhasy.ac.id/index.php/inovate/article/download/9251/5201
- OA Status
- hybrid
- References
- 3
- OpenAlex ID
- https://openalex.org/W4415268947
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4415268947Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.33752/inovate.v10i1.9251Digital Object Identifier
- Title
-
Analisis Tingkat Keamanan File Dokumen Menggunakan Algoritma Advanced Encryption Standard (AES)Work title
- Type
-
articleOpenAlex work type
- Publication year
-
2025Year of publication
- Publication date
-
2025-09-29Full publication date if available
- Authors
-
Hasan Shadzily, Bambang SujatmikoList of authors in order
- Landing page
-
https://doi.org/10.33752/inovate.v10i1.9251Publisher landing page
- PDF URL
-
https://ejournal.unhasy.ac.id/index.php/inovate/article/download/9251/5201Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://ejournal.unhasy.ac.id/index.php/inovate/article/download/9251/5201Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
3Number of works referenced by this work
Full payload
| id | https://openalex.org/W4415268947 |
|---|---|
| doi | https://doi.org/10.33752/inovate.v10i1.9251 |
| ids.doi | https://doi.org/10.33752/inovate.v10i1.9251 |
| ids.openalex | https://openalex.org/W4415268947 |
| fwci | 0.0 |
| type | article |
| title | Analisis Tingkat Keamanan File Dokumen Menggunakan Algoritma Advanced Encryption Standard (AES) |
| biblio.issue | 1 |
| biblio.volume | 10 |
| biblio.last_page | 44 |
| biblio.first_page | 37 |
| topics[0].id | https://openalex.org/T13674 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9975000023841858 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Computer Science and Engineering |
| topics[1].id | https://openalex.org/T14216 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9922000169754028 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Multimedia Learning Systems |
| topics[2].id | https://openalex.org/T11734 |
| topics[2].field.id | https://openalex.org/fields/14 |
| topics[2].field.display_name | Business, Management and Accounting |
| topics[2].score | 0.9896000027656555 |
| topics[2].domain.id | https://openalex.org/domains/2 |
| topics[2].domain.display_name | Social Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1404 |
| topics[2].subfield.display_name | Management Information Systems |
| topics[2].display_name | Decision Support System Applications |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | |
| locations[0].id | doi:10.33752/inovate.v10i1.9251 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S5407052370 |
| locations[0].source.issn | 2548-7795, 3109-0117 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2548-7795 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Inovate Jurnal Ilmiah Inovasi Teknologi Informasi |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].source.host_organization_lineage | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://ejournal.unhasy.ac.id/index.php/inovate/article/download/9251/5201 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Inovate : Jurnal Ilmiah Inovasi Teknologi Informasi |
| locations[0].landing_page_url | https://doi.org/10.33752/inovate.v10i1.9251 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5120031301 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Hasan Shadzily |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | None Hasan Shadzily |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5083016232 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-5969-2334 |
| authorships[1].author.display_name | Bambang Sujatmiko |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | None Bambang Sujatmiko |
| authorships[1].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ejournal.unhasy.ac.id/index.php/inovate/article/download/9251/5201 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-17T00:00:00 |
| display_name | Analisis Tingkat Keamanan File Dokumen Menggunakan Algoritma Advanced Encryption Standard (AES) |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T13674 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9975000023841858 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Computer Science and Engineering |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.33752/inovate.v10i1.9251 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S5407052370 |
| best_oa_location.source.issn | 2548-7795, 3109-0117 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2548-7795 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Inovate Jurnal Ilmiah Inovasi Teknologi Informasi |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.source.host_organization_lineage | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://ejournal.unhasy.ac.id/index.php/inovate/article/download/9251/5201 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Inovate : Jurnal Ilmiah Inovasi Teknologi Informasi |
| best_oa_location.landing_page_url | https://doi.org/10.33752/inovate.v10i1.9251 |
| primary_location.id | doi:10.33752/inovate.v10i1.9251 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S5407052370 |
| primary_location.source.issn | 2548-7795, 3109-0117 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2548-7795 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Inovate Jurnal Ilmiah Inovasi Teknologi Informasi |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.source.host_organization_lineage | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://ejournal.unhasy.ac.id/index.php/inovate/article/download/9251/5201 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Inovate : Jurnal Ilmiah Inovasi Teknologi Informasi |
| primary_location.landing_page_url | https://doi.org/10.33752/inovate.v10i1.9251 |
| publication_date | 2025-09-29 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4312574521, https://openalex.org/W3029608922, https://openalex.org/W3131211274 |
| referenced_works_count | 3 |
| abstract_inverted_index.8 | 151 |
| abstract_inverted_index.di | 15, 63 |
| abstract_inverted_index.128 | 75 |
| abstract_inverted_index.AES | 77 |
| abstract_inverted_index.dan | 38, 61, 84, 108 |
| abstract_inverted_index.era | 16 |
| abstract_inverted_index.ini | 53 |
| abstract_inverted_index.uji | 126 |
| abstract_inverted_index.AES, | 98 |
| abstract_inverted_index.aman | 60 |
| abstract_inverted_index.atau | 7, 165 |
| abstract_inverted_index.bit. | 76 |
| abstract_inverted_index.cara | 48 |
| abstract_inverted_index.dari | 111, 144, 161 |
| abstract_inverted_index.data | 1, 40, 89, 99, 160 |
| abstract_inverted_index.file | 3, 95 |
| abstract_inverted_index.ini. | 19 |
| abstract_inverted_index.maka | 32 |
| abstract_inverted_index.pada | 2 |
| abstract_inverted_index.pola | 164 |
| abstract_inverted_index.saat | 18 |
| abstract_inverted_index.sah, | 115 |
| abstract_inverted_index.satu | 13, 47 |
| abstract_inverted_index.yang | 5, 41, 49, 59, 80, 100, 113, 119, 122, 152, 155 |
| abstract_inverted_index.(AES) | 71 |
| abstract_inverted_index.7.96. | 137 |
| abstract_inverted_index.Hasil | 125 |
| abstract_inverted_index.Nilai | 138 |
| abstract_inverted_index.Salah | 46 |
| abstract_inverted_index.acak, | 156 |
| abstract_inverted_index.akses | 110 |
| abstract_inverted_index.bahwa | 141 |
| abstract_inverted_index.dalam | 90 |
| abstract_inverted_index.dapat | 27, 50, 105, 123 |
| abstract_inverted_index.data, | 31 |
| abstract_inverted_index.kunci | 74, 121 |
| abstract_inverted_index.mudah | 62 |
| abstract_inverted_index.nilai | 133, 149 |
| abstract_inverted_index.pihak | 112, 118 |
| abstract_inverted_index.salah | 12, 65 |
| abstract_inverted_index.telah | 81 |
| abstract_inverted_index.tidak | 114 |
| abstract_inverted_index.untuk | 24, 35, 87 |
| abstract_inverted_index.Dengan | 93 |
| abstract_inverted_index.adalah | 54, 67 |
| abstract_inverted_index.banyak | 85 |
| abstract_inverted_index.dengan | 55, 72 |
| abstract_inverted_index.hanyak | 117 |
| abstract_inverted_index.karena | 116 |
| abstract_inverted_index.sangat | 146 |
| abstract_inverted_index.secara | 9 |
| abstract_inverted_index.solusi | 34 |
| abstract_inverted_index.berbagi | 25 |
| abstract_inverted_index.digital | 10, 23, 104 |
| abstract_inverted_index.dikirim | 6 |
| abstract_inverted_index.dokumen | 4, 96 |
| abstract_inverted_index.entropy | 131, 134 |
| abstract_inverted_index.melalui | 43, 102 |
| abstract_inverted_index.menjadi | 28 |
| abstract_inverted_index.panjang | 73 |
| abstract_inverted_index.potensi | 162 |
| abstract_inverted_index.sasaran | 29 |
| abstract_inverted_index.satunya | 66 |
| abstract_inverted_index.sebesar | 136 |
| abstract_inverted_index.shannon | 130 |
| abstract_inverted_index.tinggi, | 147 |
| abstract_inverted_index.tingkat | 142 |
| abstract_inverted_index.Advanced | 68 |
| abstract_inverted_index.Keamanan | 0 |
| abstract_inverted_index.Standard | 70 |
| abstract_inverted_index.Terutama | 20 |
| abstract_inverted_index.analisis | 163 |
| abstract_inverted_index.berbagai | 91 |
| abstract_inverted_index.disimpan | 8 |
| abstract_inverted_index.jaringan | 44 |
| abstract_inverted_index.keacakan | 127, 143 |
| abstract_inverted_index.keamanan | 159 |
| abstract_inverted_index.maksimal | 150 |
| abstract_inverted_index.memiliki | 120 |
| abstract_inverted_index.mencegah | 109 |
| abstract_inverted_index.platform | 22, 103 |
| abstract_inverted_index.sehingga | 157 |
| abstract_inverted_index.serangan | 166 |
| abstract_inverted_index.terbukti | 82 |
| abstract_inverted_index.tersebut | 139 |
| abstract_inverted_index.algoritma | 57, 79 |
| abstract_inverted_index.aplikasi. | 92 |
| abstract_inverted_index.digunakan | 86 |
| abstract_inverted_index.informasi | 26 |
| abstract_inverted_index.internet. | 45 |
| abstract_inverted_index.mendekati | 148 |
| abstract_inverted_index.mengatasi | 51 |
| abstract_inverted_index.merupakan | 11, 78 |
| abstract_inverted_index.pencurian | 30 |
| abstract_inverted_index.rata-rata | 135 |
| abstract_inverted_index.teknologi | 17 |
| abstract_inverted_index.Encryption | 69 |
| abstract_inverted_index.ciphertext | 128, 145, 154 |
| abstract_inverted_index.dibutuhkan | 33 |
| abstract_inverted_index.didapatkan | 132 |
| abstract_inverted_index.dikirimkan | 42, 101 |
| abstract_inverted_index.integritas | 39 |
| abstract_inverted_index.melindungi | 36, 88 |
| abstract_inverted_index.memperkuat | 158 |
| abstract_inverted_index.menerapkan | 56 |
| abstract_inverted_index.penggunaan | 21 |
| abstract_inverted_index.permasalah | 52 |
| abstract_inverted_index.keamanannya | 83 |
| abstract_inverted_index.kerahasiaan | 37 |
| abstract_inverted_index.kriptografi | 58 |
| abstract_inverted_index.membuktikan | 140 |
| abstract_inverted_index.menggunakan | 97, 129 |
| abstract_inverted_index.terlindungi | 106 |
| abstract_inverted_index.kriptanalis. | 167 |
| abstract_inverted_index.mengenkripsi | 94 |
| abstract_inverted_index.menghasilkan | 153 |
| abstract_inverted_index.permasalahan | 14 |
| abstract_inverted_index.kerahasiannya | 107 |
| abstract_inverted_index.mendekripsinya. | 124 |
| abstract_inverted_index.implementasikan, | 64 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.23869913 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |