Design of Personal Data Security Scheme in Digital Public Service System Using AES-128 Cryptographic Algorithm
Keywords:
Cryptography, AES-128, Data Security, Public Services, Data ConfidentialityAbstract
Digital transformation in the public service sector has significantly accelerated the efficiency of government administration. However, this digitalization presents significant challenges related to cybersecurity, where the risk of personal data (Personally Identifiable Information) leakage poses a threat that could undermine public trust. This research aims to design a data security scheme in a public service system using the Advanced Encryption Standard (AES) cryptographic algorithm with a 128-bit key length. The research method used is conceptual design with a system development life cycle approach. The analysis results indicate that the AES-128 algorithm was selected due to its proven high performance and adequate level of security for public service needs. This design is recommended for implementation in public service databases to ensure the confidentiality of sensitive citizen data without overloading server performance.
Downloads
References
Alfi, M., Yundari, N. P., & Tsaqif, A. (2023). Analisis risiko keamanan siber dalam transformasi digital pelayanan publik di Indonesia. Jurnal Kajian Stratejik Ketahanan Nasional, 6(2). https://doi.org/10.7454/jkskn.v6i2.10082
Ananda, S., Rusydi, I., Faruqi, M., Ramadhan, M. W., Syahrin, M. N. A., Prayugo, R. P., & Ihsan, M. (2025). Analisis perbandingan algoritma kriptografi AES dan RSA terhadap keamanan dan waktu proses enkripsi data teks: Comparative analysis of AES and RSA cryptographic algorithms on security and processing time of text data encryption. https://jicnusantara.com/index.php/jicn
Arif, Z., & Nurokhman, A. (2023). Analisis perbandingan algoritma kriptografi simetris dan asimetris dalam meningkatkan keamanan sistem informasi: Comparative analysis of symmetric and asymmetric cryptographic algorithms in improving information system security. In JTSI, 4(2).
Aswandi, A. S., Nurtanzis Sutoyo, M., & Pradipta, A. (2025). Analisis performa dan keamanan implementasi kriptografi AES untuk penyandian dokumen berbasis web, 8(1).
Heeks, R. (2020). Implementing and managing e-government: A global perspective. Routledge.
Kapoor, B., Pandya, P., & Sherif, J. S. (2011). Cryptography: A security pillar of privacy, integrity and authenticity of data communication. Kybernetes, 40(9), 1422–1439. https://doi.org/10.1108/03684921111169468
Kaur, G., & Sood, M. (2019). Cryptography and key management in digital government services: Best practices and challenges. International Journal of Network Security, 21(3), 211–223.
National Institute of Standards and Technology. (2023). Advanced Encryption Standard (AES). https://doi.org/10.6028/NIST.FIPS.197-upd1
Singh, P., Sharma, R., & Verma, K. (2021). Securing e-government platforms using AES and TLS protocols. Journal of Cybersecurity and Digital Trust, 5(4), 78–92.
Sisilianingsih, S., Purwandari, B., Eitiveni, I., Purwaningsih, M., & Korespondensi, P. (2023). Analisis faktor transformasi digital pelayanan publik pemerintah di era pandemi. https://doi.org/10.25126/jtiik2023107059
Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson Education.
Wahid, A. A. (2020). Jurnal ilmu-ilmu informatika dan manajemen STMIK Oktober (2020): Analisis metode waterfall untuk pengembangan sistem informasi.
Whitman, M. E., & Mattord, H. J. (2018). Principles of information security (6th ed.). Cengage Learning.











