Comparison of DES, AES, IDEA RC4 and Blowfish Aglorithms in Data Encryption and Decryption

##plugins.themes.academic_pro.article.main##

Stefanus Eko Prasetyo
Gautama Wijaya
Felix

Abstract

The advancement of information technology has had a significant impact, one of which is as a medium for transmitting information from one place to another, making information access easier for many people. However, the ease of access to communication media also poses challenges for information security, as information becomes more vulnerable to being accessed, stolen, or manipulated by irresponsible parties. To protect the confidentiality of information, specific methods are needed, one of which is cryptography. In cryptography, there are various algorithms, including DES, AES, IDEA, Blowfish, Twofish, and RC4. This research aims to compare the performance of several cryptographic algorithms in the data encryption and decryption processes, focusing on processing speed and the size of the encrypted file. The results of the research show differences in processing time and file size of encrypted and decrypted data for each algorithm.


 


Keywords:  Aglorithms, Decryption, Encryption.

##plugins.themes.academic_pro.article.details##

How to Cite
Stefanus Eko Prasetyo, Gautama Wijaya, & Felix. (2025). Comparison of DES, AES, IDEA RC4 and Blowfish Aglorithms in Data Encryption and Decryption. Jurnal E-Komtek, 9(1), 340-350. https://doi.org/10.37339/e-komtek.v9i1.2259

References

Widyawan, D., & Imelda, I. (2021). Pengamanan File Menggunakan Kriptografi Dengan Metode Aes-128 Berbasis Web Di Komite Nasional Keselamatan Transportasi. Skanika, 4(1), 15–22. https://doi.org/10.36080/skanika.v4i1.2216

Rediansyah, S., Shita, R. T., & ... (2023). Pengamanan File Berbasis Web Dengan Menerapkan Algoritme Aes-128 Pada Pt. Samudra Katulistiwa Nusantara. Prosiding Seminar …, 2(April), 166–174.

Siswanto, S., Saputro, A., Utama, G. P., & Prasetyo, B. H. (2021). Penerapan Algoritma Kriptografi Twofish Untuk Mengamankan Data File. Bit (Fakultas Teknologi Informasi Universitas Budi Luhur), 18(1), 9–18. https://doi.org/10.36080/bit.v18i1.1446

Firdaus, R., & Santika, R. R. (2022). Penerapan Algoritma AES-128 Untuk Enkripsi Dokumen Di PT Caveo Biometric Security. Seminar Nasional Mahasiswa Fakultas Teknologi Informasi (SENAFTI) Universitas Budi Luhur, September, 111–120.

Simbolon, I. A. R., Gunawan, I., Kirana, I. O., Dewi, R., & Solikhun, S. (2020). Penerapan Algoritma AES 128-Bit dalam Pengamanan Data Kependudukan pada Dinas Dukcapil Kota Pematangsiantar. Journal of Computer System and Informatics (JoSYC), 1(2), 54–60.

Ignasius, A., & Shaka Yudha Sakti, D. V. (2022). Penerapan Algoritma Aes (Advance Encryption Standart) 128 Untuk Enkripsi Dokumen Di Pt. Gunung Geulis Elok Abadi. Skanika, 5(1), 1–10. https://doi.org/10.36080/skanika.v5i1.2118

Nugroho, A. P., & Suseno, H. B. (2020). Keamanan Data Transaksi Nasabah Pada Aplikasi Bank Sampah Berbasis Web Menggunakan Algoritma AES. “QUERY: Jurnal Sistem Informasi Keamanan Data Transaksi Nasabah Pada Aplikasi Bank Sampah Berbasis Web Menggunakan Algoritma AES.,” 04(April), 9–17.

Cristy, N., & Riandari, F. (2021). Implementasi Metode Advanced Encryption Standard (AES 128 Bit) Untuk Mengamankan Data Keuangan. Jurnal Ilmu Komputer Dan Sistem Informasi (JIKOMSI), 4(2), 75–85.

Setiawan, A., & Fatimah, T. (2021). Implementasi Algoritma Kriptografi Rc4 Untuk Keamanan Database Aplikasi Penggajian Karyawan Berbasis Web Pada Pt. Trans Intra Asia. Skanika, 4(1), 66–71. https://doi.org/10.36080/skanika.v4i1.2044

Tambunan, H. S., Gunawan, I., Novica Aswita, R. S., Nasution, Z. M., & Sumarno, S. (2021). Implementasi Algoritma Aes & Rc4 Terhadap Keamanan Data Produk Benih Sayuran di PT. Ewindo. Jurnal Sosial Sains, 1(6), 461–468. https://doi.org/10.59188/jurnalsosains.v1i6.126

Setti, S., Gunawan, I., Damanik, B. E., Sumarno, S., & Kirana, I. O. (2020). Implementasi Algoritma Advanced Encryption Standard dalam Pengamanan Data Penjualan Ramayana Department Store. JURIKOM (Jurnal Riset Komputer), 7(1), 182. https://doi.org/10.30865/jurikom.v7i1.1960
Pseudocode, J., Efendi, R., & Susilo, B. (2016). Vigenere Cipher Dalam Aplikasi. III, 69–82.

Rahman, A. U., Miah, S. U., & Azad, S. (2014). Advanced encryption standard. Practical Cryptography: Algorithms and Arif, Z., & Nurokhman, A. (2023). Analisis Perbandingan Algoritma Kriptografi Simetris Dan Asimetris Dalam Meningkatkan Keamanan Sistem Informasi. Jurnal Teknologi Sistem Informasi, 4(2), 394–405. https://doi.org/10.35957/jtsi.v4i2.6077

Fitriana, R. N., & Djuniadi, D. (2022). Analisis Perbandingan Algoritma AES Dan RC4 Pada Enkripsi dan Dekripsi Data Teks Berbasis CrypTool 2. Systemic: Information System and Informatics Journal, 7(2), 1–7. https://doi.org/10.29080/systemic.v7i2.1263
Schneier, B., Kelsey, J., Whiting, D., Wagner, D., & Hall, C. (1998). Twofish : A 128-Bit Block Cipher. NIST AES Proposal, 15(1), 1–27.

Most read articles by the same author(s)