A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang

Lekso Budi Handoko, Andi Danang Krismawan


The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.

Full Text:



D. P. Joseph and M. Krishna, “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 6, no. 3, pp. 51–56, 2015.

Sangeeta and E. A. Kaur, “A Review on Symmetric Key Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 358–362, 2017.

M. A. Alomari, K. Samsudin, and A. R. Ramli, “A study on encryption algorithms and modes for disk encryption,” 2009 Int. Conf. Signal Process. Syst. ICSPS 2009, pp. 793–797, 2009.

S. Singh, V. S. Rathore, R. Singh, and M. K. Singh, “Hybrid semi-blind image watermarking in redundant wavelet domain,” Multimed. Tools Appl., vol. 76, no. 18, pp. 19113–19137, Sep. 2017.

S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017.


K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” J. Appl. Intell. Syst., vol. 3, no. 1, pp. 28–38, 2018.

S. Garg, S. Khera, and A. Aggarwal, “Extended Vigenere Cipher with Stream Cipher,” Int. J. Eng. Sci. Comput., vol. 6, no. 5, pp. 5176–5180, 2016.

A. Kulsoom, D. Xiao, Aqeel-ur-Rehman, and S. A. Abbas, “An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules,” Multimed. Tools Appl., vol. 75, no. 1, pp. 1–23, 2016.

R. Naoum, A. Shihab, and S. Alhamouz, “Enhanced Image Steganography System based on Discrete Wavelet Transformation and Resilient Back-Propagation,” Int. J. Comput. Sci. Netw. Secur., vol. 16, no. 1, pp. 114–122, 2016.

A. Kumar and N. Tiwari, “Effective Implementation and Avalanche Effect of AES,” Int. J. Secur. Priv. Trust Manag., vol. 1, no. 3, pp. 31–35, 2012.

P. Witoolkollachit, “The avalanche effect of various hash functions between encrypted raw images versus non-encrypted images : A comparison study,” J. Thai Med. Informatics Assoc., vol. 1, pp. 69–82, 2016.

DOI: https://doi.org/10.33633/jais.v6i2.4502

Article Metrics

Abstract view : 209 times
PDF - 179 times


  • There are currently no refbacks.

Flag Counter





Journal of Applied Intelligent System (e-ISSN : 2502-9401p-ISSN : 2503-0493) is published by Department of Informatics Universitas Dian Nuswantoro Semarang and IndoCEISS.



Journal of Applied Intelligent System indexed by :

This journal is under licensed of Creative Commons Attribution 4.0 International License.

Visitor Stats