Multi-Format Data Encryption and Decryption with AES Cipher Block Chaining in Python

Authors

  • Witardi Gondowarsito Information Technology Engineering, Mpu Tantular Indonesia

DOI:

https://doi.org/10.61402/crj.v2i2.348

Keywords:

Enkripsi, Kriptografi, AES, Keamanan Data, Brute Force

Abstract

The digital era has transformed how people interact, work, and store information, making data a critical asset for individuals and organizations. Threats such as theft, eavesdropping, and unauthorized access drive the need for effective security solutions. Encryption is a key technology for protecting sensitive data, with the Advanced Encryption Standard (AES) established by NIST as a widely accepted standard. AES is a symmetric key cryptography algorithm that supports key sizes of 128, 192, and 256 bits, offering flexibility in security levels. This study focuses on implementing the AES algorithm in Cipher Block Chaining mode for encrypting and decrypting multi-format data (e.g., PDF, Word, PowerPoint, Excel, images, videos) using Python. The software development approach follows the Object-Oriented Analysis and Design (OOAD) methodology, consisting of three main stages: object requirements analysis, object-oriented design, and object-oriented implementation. The resulting application, 'FileGuard', successfully encrypts and decrypts various document types efficiently, providing high security against brute force attacks. Performance evaluations show that encryption and decryption processing times vary depending on document size, with AES proving to be a reliable algorithm for maintaining data security.

References

Dupré, G. (2024). Energy efficiency in AES encryption on ARM Cortex CPUs: Comparative analysis across modes of operation, data sizes, and key lengths. In.

Hafsa, A., Sghaier, A., Malek, J., & Machhout, M. (2021). Image encryption method based on improved ECC and modified AES algorithm. Multimedia Tools and Applications, 80, 19769-19801.

Hranický, R. (2022). Digital Forensics: The Acceleration of Password Cracking. Brno University of Technology Brno, Czechia,

Jimale, M. A., Z’aba, M. R., Kiah, M. L. B. M., Idris, M. Y. I., Jamil, N., Mohamad, M. S., & Rohmad, M. S. (2022). Authenticated encryption schemes: A systematic review. IEEE Access, 10, 14739-14766.

Lannge, L., & Sendek, S. (2024). Comparative Analysis of Programming Languages in Cryptography. In.

Lin, C.-H., Hu, G.-H., Chan, C.-Y., & Yan, J.-J. (2021). Chaos-based synchronized dynamic keys and their application to image encryption with an improved AES algorithm. Applied Sciences, 11(3), 1329.

Lu, Z., & Mohamed, H. (2021). A complex encryption system design implemented by AES. Journal of Information Security, 12(2), 177-187.

Minkovska, D., & Ivanova, M. (2021). Security in Multimedia Information Systems: Analysis and Prediction. Paper presented at the Methodologies and Intelligent Systems for Technology Enhanced Learning, 10th International Conference. Workshops: Volume 2.

Nabi, S. T., Kumar, M., Singh, P., Aggarwal, N., & Kumar, K. (2022). A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions. Multimedia Systems, 28(3), 939-992.

Shakor, M. Y., Khaleel, M. I., Safran, M., Alfarhood, S., & Zhu, M. (2024). Dynamic AES encryption and blockchain key management: a novel solution for cloud data security. IEEE Access, 12, 26334-26343.

Sheikhpour, S., Mahani, A., & Bagheri, N. (2021). Reliable advanced encryption standard hardware implementation: 32-bit and 64-bit data-paths. Microprocessors and Microsystems, 81, 103740.

Sousi, A.-L., Yehya, D., & Joudi, M. (2020). Aes encryption: Study & evaluation. CCEE552: Cryptography & Network Security. Presented to: Dr. Jad Nasreddine, Rafik Hariri University.

Downloads

Published

2025-03-31

How to Cite

Witardi Gondowarsito. (2025). Multi-Format Data Encryption and Decryption with AES Cipher Block Chaining in Python. Crossroad Research Journal, 2(2), 56–65. https://doi.org/10.61402/crj.v2i2.348

Issue

Section

Articles