STUDI LITERATUR MENGENAI KINERJA BLOWFISH, AES, CHACHA20, DAN GCM DALAM SISTEM KEAMANAN DATA

Main Article Content

I Putu Aditya Brama Putra Cakra Negara
M. Naufal Nafian Abror
Nieldy Rejekinta Tarigan

Abstract

Keamanan data merupakan aspek krusial di era digital untuk melindungi informasi sensitif dari ancaman akses tidak sah dan pencurian data. Penelitian ini membandingkan empat algoritma enkripsi simetris, yaitu Advanced Encryption Standard (AES), Blowfish, ChaCha20, dan Galois/Counter Mode (GCM), berdasarkan efisiensi dan tingkat keamanan yang ditawarkan. Metodologi penelitian menggunakan tinjauan literatur untuk menganalisis kelebihan dan kekurangan masing-masing algoritma dalam berbagai aplikasi, termasuk komunikasi online, transaksi keuangan, dan penyimpanan data di cloud. Hasil analisis menunjukkan bahwa AES menawarkan keseimbangan optimal antara kecepatan dan keamanan, dengan dukungan akselerasi perangkat keras (AES-NI) yang meningkatkan efisiensinya pada sistem modern. Blowfish unggul dalam kecepatan, tetapi keterbatasan ukuran blok 64-bit membatasinya pada aplikasi dengan data berukuran besar. ChaCha20 menunjukkan performa tinggi dan keamanan pada perangkat tanpa akselerasi perangkat keras, sedangkan GCM menyediakan autentikasi data tambahan yang ideal untuk aplikasi yang membutuhkan integritas data. Penelitian menegaskan bahwa AES-GCM adalah solusi unggulan untuk enkripsi modern, menggabungkan efisiensi, keamanan, dan autentikasi dalam satu mekanisme, sehingga sangat cocok untuk lingkungan yang memerlukan throughput tinggi dan perlindungan data yang kuat, seperti sistem keuangan dan penyimpanan data di cloud.

Downloads

Download data is not yet available.

Article Details

How to Cite
I Putu Aditya Brama Putra Cakra Negara, M. Naufal Nafian Abror, & Nieldy Rejekinta Tarigan. (2025). STUDI LITERATUR MENGENAI KINERJA BLOWFISH, AES, CHACHA20, DAN GCM DALAM SISTEM KEAMANAN DATA. Trigonometri: Jurnal Matematika Dan Ilmu Pengetahuan Alam, 6(1), 31–40. https://doi.org/10.3483/trigonometri.v6i1.10133
Section
Articles

References

Ashur, T., Dunkelman, O., & Luykx, A. (2017). Boosting Authenticated Encryption Robustness with Minimal Modifications (pp. 3–33). https://doi.org/10.1007/978-3-319-63697-9_1

Assa-Agyei, K., & Olajide, F. (2023). A Comparative Study of Twofish, Blowfish, and Advanced Encryption Standard for Secured Data Transmission. International Journal of Advanced Computer Science and Applications, 14(3), 393–398. https://doi.org/10.14569/IJACSA.2023.0140344

Cai, W., & Yao, H. (2022). A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm. Wireless Personal Communications, 127(1), 341–352. https://doi.org/10.1007/s11277-021-08266-w

Degabriele, J. P., Govinden, J., Günther, F., & Paterson, K. G. (2021). The Security of ChaCha20-Poly1305 in the Multi-User Setting. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 1981–2003. https://doi.org/10.1145/3460120.3484814

Et. al., P. S. (2021). Performance Analysis of Cascaded Hybrid Symmetric Encryption Models. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(2), 1699–1708. https://doi.org/10.17762/turcomat.v12i2.1506

Ghosh, A. (2020). Comparison of Encryption Algorithms : AES , Blowfish and Twofish for Security of Wireless Networks. International Research Journal of Engineering and Technology (IRJET), June, 4656–4659. https://doi.org/10.13140/RG.2.2.31024.38401

Katz, J., & Shacham, H. (Eds.). (2017). Advances in Cryptology – CRYPTO 2017 (Vol. 10403). Springer International Publishing. https://doi.org/10.1007/978-3-319-63697-9

Madhusudhan, N., Padma, P., & Rao, R. (2021). Development of Pipelined Blowfish Algorithm with Memory based S-Box. Journal of Physics: Conference Series, 1804(1). https://doi.org/10.1088/1742-6596/1804/1/012159

Mandal, P. C. (2012). Evaluation of performance of the Symmetric Key Algorithms : DES , 3DES , AES and Blowfish. Journal of Global Research in Computer Science, 3(8), 67–70.

Muhammed, R. K., Aziz, R. R., Hassan, A. A., Aladdin, A. M., Saydah, S. J., Rashid, T. A., & Hassan, B. A. (2024a). Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption. Kurdistan Journal of Applied Research, 9(1), 52–65. https://doi.org/10.24017/science.2024.1.5

Muhammed, R. K., Aziz, R. R., Hassan, A. A., Aladdin, A. M., Saydah, S. J., Rashid, T. A., & Hassan, B. A. (2024b). Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption. Kurdistan Journal of Applied Research, 9(1), 52–65. https://doi.org/10.24017/science.2024.1.5

Noura, H. N., Salman, O., Couturier, R., & Chehab, A. (2022). A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices. IEEE Internet of Things Journal, 9(18), 17885–17900. https://doi.org/10.1109/JIOT.2022.3161192

Salkanovic, A., Ljubic, S., Stankovic, L., & Lerga, J. (2021). Analysis of Cryptography Algorithms Implemented in Android Mobile Application. Information Technology and Control, 50(4), 786–807. https://doi.org/10.5755/j01.itc.50.4.29464

Shabani, D. B., & Lam, W. Y. (2013). A REVIEW OF COMPARISON STUDIES IN APPLIED BEHAVIOR ANALYSIS. Behavioral Interventions, 28(2), 158–183. https://doi.org/10.1002/bin.1361

Singh, P. K. (2022). A Note on Symmetric Key Cryptosystems. International Journal of Advanced Networking and Applications, 15–18. https://doi.org/10.35444/IJANA.2022.ICCMEApaper05

Taha, M. H., & Al-Tuwaijari, J. M. (2021). Improvement of Chacha20 algorithm based on tent and Chebyshev chaotic maps. Iraqi Journal of Science, 62(6), 2029–2039. https://doi.org/10.24996/ijs.2021.62.6.29

Verma, O. P., Agarwal, R., Dafouti, D., & Tyagi, S. (2011). Notice of Violation of IEEE Publication Principles - Peformance analysis of data encryption algorithms. 2011 3rd International Conference on Electronics Computer Technology, 399–403. https://doi.org/10.1109/ICECTECH.2011.5942029