Performance Evaluation and the Impact of File Size on Various AES Encryption Modes

Authors

  • Galih Putra Riatma Politeknik Negeri Malang
  • Bagas Satya Dian Nugraha Politeknik Negeri Malang
  • Anugrah Nur Rahmanto Politeknik Negeri Malang
  • Fitri Fitri Politeknik Negeri Malang

DOI:

https://doi.org/10.33795/jartel.v15i2.7323

Keywords:

AES, comparison, encryption, performance, security

Abstract

Important factors in the system are performance and information security. A secure system does not necessarily have fast performance because it takes time for encryption processing that takes time. For that, the system must use an encryption mode that suits the needs. This study measures the encryption performance of five AES methods, namely AES-ECB, AES-SIV, AES-CBC, AES-EAX, and AES-GCM on text data, and images with sizes of 1KB, 10KB, 100KB, and 1000KB. Performance testing is carried out using the same hardware and software to ensure consistency. From the analysis results, it was found that the AES-ECB (Electronic Codebook) encryption results had the fastest encryption time but sacrificed security because of the data patterns seen in the ciphertext. Meanwhile, AES-SIV (Synthetic Initialization Vector) produced performance that tended to be constant for all file sizes, without sacrificing security against nonce reuse. AES-CBC (Cipher Block Chaining) produced a time that increased as the file size increased. The larger the encrypted file, the slower the CBC encryption performance due to the chaining nature of CBC encryption. Meanwhile, EAX and GCM show significant time improvements for small file sizes but not too significant improvements for large files. From the results of EAX and GCM, it can be concluded that both modes are efficient for encrypting large files. From the analysis results, it was found that GCM mode provides strong security without a significant impact on system performance. This research can help developers when developing systems that require encryption in environments with limited resources such as embedded systems or IoT devices

References

R. M. Muchamad, A. Asriyanik, and A. Pambudi, “Implementasi Algoritma Advanced Encryption Standard (AES) untuk Mengenkripsi Datastore pada Aplikasi Berbasis Android,” Jurnal Mnemonic, vol. 6, no. 1, pp. 55–64, 2023. doi: 10.36040/mnemonic.v6i1.5889.

N. Mouha, “Review of the Advanced Encryption Standard,” National Institute of Standards and Technology (NIST), 2021. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/ir/2021/NIST.IR.8319.pdf. [Accessed: Jun. 2025].

A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 Untuk Enkripsi dan Dekripsi File Dokumen,” Eksplora Informatika, vol. 8, no. 1, p. 52, 2018. doi: 10.30864/eksplora.v8i1.139.

U. K. Prodhan, A. H. M. Shahariar, I. Hussain, F. Rumi, J. Kabi, and K. Nazrul, “Performance analysis of parallel implementation of Advanced Encryption Standard (AES) over serial implementation,” International Journal of Information Science and Technology, vol. 2, no. 6, pp. 1–16, 2012. doi: 10.5121/IJIST.2012.2601.

S. Kumar, “A review on high-speed Advanced Encryption Standard (AES),” Journal of Emerging Technologies and Innovative Research, vol. 5, no. 8, pp. 1255–1260, 2018. [Online]. Available: https://www.jetir.org/view?paper=JETIRA006219. [Accessed: Jun. 2025].

M. P. Manuel and K. Daimi, “Implementing cryptography in LoRa-based communication devices for unmanned ground vehicle applications,” SN Applied Sciences, vol. 3, no. 4, 2021. doi: 10.1007/s42452-021-04377-y.

T. Taufiqqurrachman and D. Elsandi, “Security analysis and encryption time comparison on cryptography Advanced Encryption Standard (AES),” Jurnal Inovatif, vol. 5, no. 1, p. 60, 2022. doi: 10.32832/inova-tif.v5i1.8345.

K. Muttaqin and J. Rahmadoni, “Analysis and design of file security system using AES cryptography,” Journal of Advanced Encryption and Technology Studies, vol. 1, no. 2, pp. 113–123, 2020. doi: 10.37385/JAETS.V1I2.78.

U. Pujeri, S. S. Desai, and A. Savyanavar, Encryption Techniques for the Modern World, IGI Global, 2020, pp. 285–319. doi: 10.4018/978-1-5225-8458-2.CH013.

O. Agbelusi and M. Olumuyiwa, “Comparative analysis of encryption algorithms,” European Journal of Technology, vol. 7, no. 1, pp. 1–9, 2023. doi: 10.47672/ejt.1312.

N. Agnihotri and A. K. Sharma, “Comparative analysis of different symmetric encryption techniques based on computation time,” Grid Computing, 2020. doi: 10.1109/PDGC50313.2020.9315848.

B. Olivia et al., “Implementasi Kriptografi pada Keamanan Data menggunakan algoritma Advanced Encryption Standard (AES),” Jurnal Simantec, vol. 11, no. 2, pp. 167–174, 2023.

A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 Untuk Enkripsi dan Dekripsi File Dokumen,” Eksplora Informatika, vol. 8, no. 1, p. 52, 2018. doi: 10.30864/eksplora.v8i1.139.

A. U. Rahman, S. U. Miah, and S. Azad, “Advanced encryption standard,” Practical Cryptography: Algorithms and Implementations Using C++, pp. 91–126, 2014. doi: 10.1201/b17707.

R. Ravida and H. A. Santoso, “Advanced Encryption Standard (AES) 128-bit untuk keamanan data Internet of Things (IoT) tanaman hidroponik,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 4, no. 6, 2020. doi: 10.29207/resti.v4i6.2478.

B. P. and A. Farisi, “Perbandingan kinerja algoritma kandidat AES dalam enkripsi dan dekripsi file dokumen,” MDP Student Conference, vol. 2, no. 1, pp. 282–289, 2023. doi: 10.35957/mdp-sc.v2i1.4367.

J. S. Schwarz, C. Chapman, and E. McDonnell Feit, “An overview of Python,” in Python for Marketing Research and Analytics, Springer International Publishing, 2020, pp. 9–45. doi: 10.1007/978-3-030-49720-0_2.

A. Bogdanov, “AES-based authenticated encryption modes in parallel high-performance software,” IACR Cryptology ePrint Archive, 2014. [Online]. Available: http://eprint.iacr.org/2014/186.pdf. [Accessed: Jun. 2025].

C. Christopher, A. Gunawan, and S. Prima, “Encrypted short message service design using combination of modified AES and Vigenere cipher algorithm,” EMACS Journal, vol. 4, no. 2, pp. 73–77, 2022. doi: 10.21512/emacsjournal.v4i2.8273.

H. D. Kotha, “AES encryption and decryption standards,” Journal of Physics: Conference Series, vol. 1228, no. 1, p. 012006, 2019. doi: 10.1088/1742-6596/1228/1/012006.

National Institute of Standards and Technology, “Recommendation for block cipher modes of operation,” NIST Special Publication 800-38A, 2001. [Online]. Available: http://csrc.nist.gov/publications/drafts/800-38g/sp800_38g_draft.pdf. [Accessed: Jun. 2025].

Downloads

Published

30-06-2025

How to Cite

Riatma, G. P., Nugraha, B. S. D., Rahmanto, A. N., & Fitri, F. (2025). Performance Evaluation and the Impact of File Size on Various AES Encryption Modes. JURNAL JARTEL: Jurnal Jaringan Telekomunikasi, 15(2), 121–128. https://doi.org/10.33795/jartel.v15i2.7323