PENERAPAN KRIPTOGRAFI UNTUK PENGAMANAN DOKUMEN NASABAH ASURANSI MENGGUNAKAN METODE AES-128
DOI:
https://doi.org/10.31000/jika.v10i1.15048Abstrak
Dalam era digital, perlindungan data nasabah menjadi krusial, terutama bagi PT Asuransi Jiwa Astra yang mengelola dokumen rahasia. Maraknya kebocoran data menuntut sistem keamanan kuat. Penelitian ini mengembangkan aplikasi enkripsi dan dekripsi dokumen menggunakan algoritma Advanced Encryption Standard (AES) 128-bit untuk mengatasi masalah tersebut. Metode yang digunakan meliputi perancangan, implementasi, dan pengujian aplikasi, berfokus pada fungsionalitas, performa, dan keamanan data. Aplikasi ini mendukung unggah, enkripsi-dekripsi, penyimpanan, serta unduh dokumen secara otomatis dan aman. Hasil pengujian menunjukkan fungsi berjalan optimal dengan keberhasilan 100%. Proses enkripsi rata-rata 3,35 detik per file (maks. 3MB). Dari sisi keamanan, AES-128 terbukti efektif melindungi kerahasiaan data hingga 99%. Dengan demikian, sistem ini layak digunakan sebagai solusi pengamanan dokumen digital di PT Asuransi Jiwa Astra.Referensi
Abdullah, R. K., Azhar, N. F., Mujahidin, S., & Hoan, R. O. (2025). Penerapan Enkripsi Hibrida AES-RSA Untuk Meningkatkan Keamanan Layanan Sistem Informasi Distribusi Slip Gaji. Jambura Journal of Electrical and Electronics Engineering (JJEEE), 7(1), 33–40. https://doi.org/https://doi.org/10.37905/jjeee.v7i1.28737
Arieska, A. E. B., & Mukti, F. S. (2023). Pemanfaatan One-Time Password dan Algoritma Advanced Encryption Standard dalam Sistem Login Internet Kampus. G-Tech: Jurnal Teknologi Terapan, 7(4), 1262–1271. https://doi.org/https://doi.org/10.33379/gtech.v7i4.3003
Baqis, A. M., & Nasution, M. I. P. (2025). Pentingnya Perlindungan dan Keamanan Data Privasi di Era Digital. Jurnal Manajemen dan Pendidikan Agama Islam, 3(3), 396–404. https://doi.org/https://doi.org/10.61132/jmpai.v3i3.1150
Bhagaskara, G. P. K., & Priyanto, I. M. D. (2024). Perlindungan Hukum terhadap Nasabah Terkait Bocornya Data Nasabah Berdasarkan Perspektif Hukum Perbankan. Eksekusi : Jurnal Ilmu Hukum dan Administrasi Negara, 2(2), 162–170. https://doi.org/10.55606/eksekusi.v2i2.1099
Butarbutar, R. (2023). Kejahatan Siber Terhadap Individu : Jenis , Analisis , dan Perkembangannya. Technology and Economics Law Journal Volume, 2(2), 299–317. https://doi.org/https://doi.org/10.21143/TELJ.vol2.no2.1043
Handayani, I. P., & Pradana, R. (2023). Smart Home Controlling Menggunakan PLC Method. Jurnal TICOM (Technoology of Information and Computer), 11(2), 108–112. https://doi.org/https://doi.org/10.70309/ticom.v11i2.79
Handoyo, E., Kriswantoro, M. C., & Anugrah, B. (2025). Analisis Keamanan Siber Kampus Menggunakan Framework Cobit 2019 Pada Domain Delivery, Service and Support (DSS). JIKA (Jurnal Informatika), 9(2), 159–168. https://doi.org/https://10.31000/jika.v9i2.12845
Hasibuan, E. S., & Putri, E. A. (2024). Perlindungan Keamanan Atas Data Pribadi Di Dunia Maya. Jurnal Hukum Sasana, 10(1), 70–83. https://doi.org/https://doi.org/10.31599/sasana.v10i1.2134
Ihtisyamuddin, A., Hartanto, F., & Kurniawan, E. D. (2024). Penyalahgunaan Teknologi Komputer untuk Tindakan Kriminal Siber dalam Novel Simvlacrm Karya Cassandra & Noorca Marendra Massardi. Jupiter: Publikasi Ilmu Keteknikan Industri, Teknik Elektro dan Informatika, 2(1), 179–189. https://doi.org/https://doi.org/10.61132/jupiter.v2i1.68
Mediana. (2024). Kemenkominfo Tangani 111 Kasus Kebocoran Data Pribadi Sepanjang 2019-2024. kompas.id, 1. https://www.kompas.id/artikel/111-kasus-kebocoran-data-pribadi-ditangani-kemenkominfo-pada-2019-14-mei-2024
Nanda, N. A., Silalahi, S. M. S., Fatricia Nasution, D., Sari, M., & Gunawan, I. (2023). Kriptografi dan Penerapannya Dalam Sistem Keamanan Data. Jurnal Media Informatika, 4(2), 90–93. https://doi.org/10.55338/jumin.v4i2.428
Nopriadi, N. (2024). Menjaga Privasi Digital: Studi Tentang Kesadaran Mahasiswa dalam Perlindungan Data Pribadi di Media Sosial. Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam, 2(6), 87–97. https://doi.org/https://doi.org/10.62383/polygon.v2i6.297
Nugraha, D. A., Nurfitroh, R., Ul-Haq, N. D., Dika, R. P., & Lagontang, S. N. (2025). Kebocoran Data BPJS Kesehatan: Ancaman Terhadap Keamanan Informasi Publik di Era Digital. Integrative Perspectives of Social and Science Journal (IPSSJ), 2(3), 4685–4691. https://economy.okezone.com/read/2021/05/25/320/2415107/kebocoran-data-bpjs-kesehatan-dirut-karena-peretasan
Ramadhan, A. A. I., Rivanti, E. Z., & Zulva, R. S. (2023). Implementasi Kriptografi AES Menggunakan Bahasa Java Programming: Meningkatkan Keamanan Data Melalui Enkripsi & Dekripsi Yang Kuat. Jurnal Pendidikan Teknologi Informasi, 2(1), 20–26. https://jurnal.umj.ac.id/index.php/TripleA/article/view/17513%0Ahttps://jurnal.umj.ac.id/index.php/TripleA/article/download/17513/9646
Rizky, P. A., Soim, S., & Sholihin. (2024). Implementasi Algoritma Kriptografi AES CBC Untuk Keamanan Komunikasi Data Pada Hardware. RESISTOR (Rekayasa Sistem Komputer), 7(2), 71–78. https://doi.org/https://doi.org/10.31598/jurnalresistor.v7i2.1650
Saripa, S. (2024). Implementasi Sistem Keamanan File Menggunakan Algoritma AES untuk Mengamankan File Pribadi. Progressive Information, Security, Computer, and Embedded System (PISCES), 1(2), 138–148. https://doi.org/https://doi.org/10.61255/pisces.v1i2.100
Suari, K. R. A., & Sarjana, I. M. (2023). Menjaga Privasi di Era Digital: Perlindungan Data Pribadi di Indonesia. Jurnal Analisis Hukum, 6(1), 132–146. https://doi.org/https://doi.org/10.38043/jah.v6i1.4484
Sulung, U., & Muspawi, M. (2024). MEMAHAMI SUMBER DATA PENELITIAN: PRIMER, SEKUNDER, DAN TERSIER. Edu Research, 5(3), 110–116. https://doi.org/https://doi.org/10.47827/jer.v5i3.238
Wachid Hidayatulloh, N., Tahir, M., Amalia, H., Afdlolul Basyar, N., Faizal Prianggara, A., & Yasin, M. (2023). Mengenal Advance Encrytion Standard (AES) Sebagai Algoritma Kriptografi Dalam Mengamankan Data. Digital Transformation Technology (Digitech), 03(1), 1–10. https://doi.org/https://doi.org/10.47709/digitech.v3i1.2293
Unduhan
File Tambahan
Diterbitkan
Terbitan
Bagian
Lisensi
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Advances in Intelligent Informatics agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Licensing for Data Publication
International Journal of Advances in Intelligent Informatics use a variety of waivers and licenses, that are specifically designed for and appropriate for the treatment of data:
Open Data Commons Attribution License, http://www.opendatacommons.org/licenses/by/1.0/ (default)
Creative Commons CC-Zero Waiver, http://creativecommons.org/publicdomain/zero/1.0/
Open Data Commons Public Domain Dedication and Licence, http://www.opendatacommons.org/licenses/pddl/1-0/
Other data publishing licenses may be allowed as exceptions (subject to approval by the editor on a case-by-case basis) and should be justified with a written statement from the author, which will be published with the article.
Open Data and Software Publishing and Sharing
The journal strives to maximize the replicability of the research published in it. Authors are thus required to share all data, code or protocols underlying the research reported in their articles. Exceptions are permitted but have to be justified in a written public statement accompanying the article.
Datasets and software should be deposited and permanently archived inappropriate, trusted, general, or domain-specific repositories (please consult http://service.re3data.org and/or software repositories such as GitHub, GitLab, Bioinformatics.org, or equivalent). The associated persistent identifiers (e.g. DOI, or others) of the dataset(s) must be included in the data or software resources section of the article. Reference(s) to datasets and software should also be included in the reference list of the article with DOIs (where available). Where no domain-specific data repository exists, authors should deposit their datasets in a general repository such as ZENODO, Dryad, Dataverse, or others.
Small data may also be published as data files or packages supplementary to a research article, however, the authors should prefer in all cases a deposition in data repositories.