Design of Personal Data Security Scheme in Digital Public Service System Using AES-128 Cryptographic Algorithm

Authors

  • Fandi Fajar Maulana Universitas Esa Unggul
  • Eka Jiparolim Universitas Esa Unggul
  • Eko Nurcahyo Universitas Esa Unggul
  • Jefry Sunupurwa Asri Universitas Esa Unggul

Keywords:

Cryptography, AES-128, Data Security, Public Services, Data Confidentiality

Abstract

Digital transformation in the public service sector has significantly accelerated the efficiency of government administration. However, this digitalization presents significant challenges related to cybersecurity, where the risk of personal data (Personally Identifiable Information) leakage poses a threat that could undermine public trust. This research aims to design a data security scheme in a public service system using the Advanced Encryption Standard (AES) cryptographic algorithm with a 128-bit key length. The research method used is conceptual design with a system development life cycle approach. The analysis results indicate that the AES-128 algorithm was selected due to its proven high performance and adequate level of security for public service needs. This design is recommended for implementation in public service databases to ensure the confidentiality of sensitive citizen data without overloading server performance.

Downloads

Download data is not yet available.

References

Alfi, M., Yundari, N. P., & Tsaqif, A. (2023). Analisis risiko keamanan siber dalam transformasi digital pelayanan publik di Indonesia. Jurnal Kajian Stratejik Ketahanan Nasional, 6(2). https://doi.org/10.7454/jkskn.v6i2.10082

Ananda, S., Rusydi, I., Faruqi, M., Ramadhan, M. W., Syahrin, M. N. A., Prayugo, R. P., & Ihsan, M. (2025). Analisis perbandingan algoritma kriptografi AES dan RSA terhadap keamanan dan waktu proses enkripsi data teks: Comparative analysis of AES and RSA cryptographic algorithms on security and processing time of text data encryption. https://jicnusantara.com/index.php/jicn

Arif, Z., & Nurokhman, A. (2023). Analisis perbandingan algoritma kriptografi simetris dan asimetris dalam meningkatkan keamanan sistem informasi: Comparative analysis of symmetric and asymmetric cryptographic algorithms in improving information system security. In JTSI, 4(2).

Aswandi, A. S., Nurtanzis Sutoyo, M., & Pradipta, A. (2025). Analisis performa dan keamanan implementasi kriptografi AES untuk penyandian dokumen berbasis web, 8(1).

Heeks, R. (2020). Implementing and managing e-government: A global perspective. Routledge.

Kapoor, B., Pandya, P., & Sherif, J. S. (2011). Cryptography: A security pillar of privacy, integrity and authenticity of data communication. Kybernetes, 40(9), 1422–1439. https://doi.org/10.1108/03684921111169468

Kaur, G., & Sood, M. (2019). Cryptography and key management in digital government services: Best practices and challenges. International Journal of Network Security, 21(3), 211–223.

National Institute of Standards and Technology. (2023). Advanced Encryption Standard (AES). https://doi.org/10.6028/NIST.FIPS.197-upd1

Singh, P., Sharma, R., & Verma, K. (2021). Securing e-government platforms using AES and TLS protocols. Journal of Cybersecurity and Digital Trust, 5(4), 78–92.

Sisilianingsih, S., Purwandari, B., Eitiveni, I., Purwaningsih, M., & Korespondensi, P. (2023). Analisis faktor transformasi digital pelayanan publik pemerintah di era pandemi. https://doi.org/10.25126/jtiik2023107059

Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson Education.

Wahid, A. A. (2020). Jurnal ilmu-ilmu informatika dan manajemen STMIK Oktober (2020): Analisis metode waterfall untuk pengembangan sistem informasi.

Whitman, M. E., & Mattord, H. J. (2018). Principles of information security (6th ed.). Cengage Learning.

Downloads

Published

2026-03-12

How to Cite

Fandi Fajar Maulana, Eka Jiparolim, Eko Nurcahyo, & Jefry Sunupurwa Asri. (2026). Design of Personal Data Security Scheme in Digital Public Service System Using AES-128 Cryptographic Algorithm. Jurnal Multidisiplin Sahombu, 6(03), 620–624. Retrieved from https://ejournal.seaninstitute.or.id/index.php/JMS/article/view/8077