Multi-Format Data Encryption and Decryption with AES Cipher Block Chaining in Python
DOI:
https://doi.org/10.61402/crj.v2i2.348Keywords:
Enkripsi, Kriptografi, AES, Keamanan Data, Brute ForceAbstract
The digital era has transformed how people interact, work, and store information, making data a critical asset for individuals and organizations. Threats such as theft, eavesdropping, and unauthorized access drive the need for effective security solutions. Encryption is a key technology for protecting sensitive data, with the Advanced Encryption Standard (AES) established by NIST as a widely accepted standard. AES is a symmetric key cryptography algorithm that supports key sizes of 128, 192, and 256 bits, offering flexibility in security levels. This study focuses on implementing the AES algorithm in Cipher Block Chaining mode for encrypting and decrypting multi-format data (e.g., PDF, Word, PowerPoint, Excel, images, videos) using Python. The software development approach follows the Object-Oriented Analysis and Design (OOAD) methodology, consisting of three main stages: object requirements analysis, object-oriented design, and object-oriented implementation. The resulting application, 'FileGuard', successfully encrypts and decrypts various document types efficiently, providing high security against brute force attacks. Performance evaluations show that encryption and decryption processing times vary depending on document size, with AES proving to be a reliable algorithm for maintaining data security.
References
Dupré, G. (2024). Energy efficiency in AES encryption on ARM Cortex CPUs: Comparative analysis across modes of operation, data sizes, and key lengths. In.
Hafsa, A., Sghaier, A., Malek, J., & Machhout, M. (2021). Image encryption method based on improved ECC and modified AES algorithm. Multimedia Tools and Applications, 80, 19769-19801.
Hranický, R. (2022). Digital Forensics: The Acceleration of Password Cracking. Brno University of Technology Brno, Czechia,
Jimale, M. A., Z’aba, M. R., Kiah, M. L. B. M., Idris, M. Y. I., Jamil, N., Mohamad, M. S., & Rohmad, M. S. (2022). Authenticated encryption schemes: A systematic review. IEEE Access, 10, 14739-14766.
Lannge, L., & Sendek, S. (2024). Comparative Analysis of Programming Languages in Cryptography. In.
Lin, C.-H., Hu, G.-H., Chan, C.-Y., & Yan, J.-J. (2021). Chaos-based synchronized dynamic keys and their application to image encryption with an improved AES algorithm. Applied Sciences, 11(3), 1329.
Lu, Z., & Mohamed, H. (2021). A complex encryption system design implemented by AES. Journal of Information Security, 12(2), 177-187.
Minkovska, D., & Ivanova, M. (2021). Security in Multimedia Information Systems: Analysis and Prediction. Paper presented at the Methodologies and Intelligent Systems for Technology Enhanced Learning, 10th International Conference. Workshops: Volume 2.
Nabi, S. T., Kumar, M., Singh, P., Aggarwal, N., & Kumar, K. (2022). A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions. Multimedia Systems, 28(3), 939-992.
Shakor, M. Y., Khaleel, M. I., Safran, M., Alfarhood, S., & Zhu, M. (2024). Dynamic AES encryption and blockchain key management: a novel solution for cloud data security. IEEE Access, 12, 26334-26343.
Sheikhpour, S., Mahani, A., & Bagheri, N. (2021). Reliable advanced encryption standard hardware implementation: 32-bit and 64-bit data-paths. Microprocessors and Microsystems, 81, 103740.
Sousi, A.-L., Yehya, D., & Joudi, M. (2020). Aes encryption: Study & evaluation. CCEE552: Cryptography & Network Security. Presented to: Dr. Jad Nasreddine, Rafik Hariri University.







