Analisis Kinerja AES dan RC6 pada File Multimedia
DOI:
https://doi.org/10.54259/satesi.v6i1.7523Keywords:
AES, RC6, Multimedia Encryption, Performance Analysis, ThroughputAbstract
This study aims to analyze and compare the performance of symmetric cryptographic algorithms, namely Advanced Encryption Standard (AES) and Rivest Cipher 6 (RC6), in securing multimedia files. The research employs a quantitative experimental approach using various file formats, including JPG, PNG, MP3, and MP4, with different file sizes. Performance evaluation is conducted based on three main parameters: encryption time, decryption time, and throughput. The implementation is carried out in a controlled local environment using Python to ensure consistency and accuracy of measurements. The results show that AES consistently outperforms RC6 in terms of faster encryption and decryption processes as well as higher and more stable throughput across all tested formats and file sizes. In contrast, RC6 exhibits higher computational overhead due to its complex arithmetic operations, resulting in slower processing time and less stable performance. Furthermore, the findings indicate that file size and format significantly influence algorithm performance, where larger and more complex multimedia data require higher processing time. This study contributes a comprehensive multi-format evaluation framework that provides practical insights for selecting efficient cryptographic algorithms in real-world multimedia security applications.
Downloads
References
M. A. Jimale et al., “Authenticated encryption schemes: A systematic review,” IEEE Access, vol. 10, pp. 14739–14766, 2022, doi: 10.1109/ACCESS.2022.3147201.
S. Balli and M. Yilmaz, “Multi-criteria usability evaluation of symmetric data encryption algorithms in fuzzy environment,” SN Appl. Sci., vol. 2, p. 1393, 2020, doi: 10.1007/s42452-020-3170-9.
X. Zhang, Y. Liu, and Z. Wang, “Improved RC6 block cipher,” Comput. Mater. Contin., vol. 70, no. 1, pp. 1123–1137, 2021.
H. Kaur and M. Singh, “Performance evaluation of symmetric encryption algorithms for multimedia data,” Int. J. Comput. Appl., vol. 183, no. 4, pp. 1–6, 2021.
S. Gafur and E. Aribowo, “Studi Pendekatan Quality & Differential Analysis terhadap Kinerja Algoritma {AES}-{CBC} pada Enkripsi Gambar,” J. Teknol. Inf. dan Ilmu Komput., vol. 12, no. 5, pp. 1115–1122, 2025.
M. B. B. Timur, Royansyah, and D. Kusumaningsih, “Comparison of Efficiency and Security of {AES}, Blowfish, and ChaCha20 Cryptographic Algorithms on Image and Document Files,” Innov. Res. Informatics, vol. 7, no. 2, pp. 96–102, 2025, doi: 10.37058/innovatics.v7i2.15748.
S. Basu, S. Roy, and A. Mukherjee, “Multimedia data encryption using symmetric cryptography: A performance perspective,” Multimed. Tools Appl., vol. 82, pp. 21435–21458, 2023.
W. Gondowarsito, “Multi-Format Data Encryption and Decryption with {AES} Cipher Block Chaining in Python,” Crossroad Res. J., vol. 2, no. 2, pp. 56–65, 2025, doi: 10.61402/crj.v2i2.348.
A. F. Pranata, A. F. Saragih, R. Fikri, K. Rahmadani, and N. P. Aulia, “Analisis Perbandingan Enkripsi dan Dekripsi Menggunakan Algoritma Simetris {AES} dan Hybrid ({AES} + {RSA}) Pada File Video,” JIKUM J. Ilmu Komput., vol. 2, no. 1, pp. 102–107, 2026, doi: 10.62671/jikum.v2i1.143.
R. B. Alothman, I. I. Saada, and B. S. B. Al-Brge, “A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing,” J. Cases Inf. Technol., vol. 24, no. 2, pp. 1–18, 2022, doi: 10.4018/JCIT.20220101.oa1.
A. Arifin and M. Rizal, “Implementasi Sistem Otomatisasi Perawatan Tanaman indoor berbasis Internet of Things (IoT),” remik, vol. 7, no. 2, pp. 935–945, 2023, doi: 10.33395/remik.v7i2.12277.
P. Matta, “A comparative survey on data encryption techniques: Big data perspective,” Mater. Today Proc., vol. 51, pp. 776–779, 2021, doi: 10.1016/j.matpr.2021.05.415.
R. B. Alothman, “A performance-based comparative study of symmetric encryption algorithms,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 6, pp. 3275–3285, 2022.
M. A. Khan, A. U. Rehman, and M. K. Khan, “Performance evaluation of AES for secure multimedia communication,” IEEE Access, vol. 10, pp. 84567–84580, 2022.
R. B. Alothman, “A performance-based comparative encryption analysis,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 6, pp. 3275–3285, 2022.
A. P. U. Siahaan, “Secure image encryption using AES,” in Information Technology Conference, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Sugiyatno Sugiyatno, Hafidz Maulana Rahman

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).























