Analisis Kinerja AES dan RC6 pada File Multimedia
DOI:
https://doi.org/10.54259/satesi.v6i1.7523Kata Kunci:
AES, RC6, Multimedia Encryption, Performance Analysis, ThroughputAbstrak
Penelitian ini bertujuan untuk menganalisis dan membandingkan kinerja algoritma kriptografi simetris Advanced Encryption Standard (AES) dan Rivest Cipher 6 (RC6) dalam pengamanan file multimedia. Metode yang digunakan adalah eksperimen kuantitatif dengan data uji berupa berbagai format file, yaitu JPG, PNG, MP3, dan MP4 dengan variasi ukuran. Evaluasi kinerja dilakukan berdasarkan tiga parameter utama, yaitu waktu enkripsi, waktu dekripsi, dan throughput. Implementasi dilakukan dalam lingkungan lokal terkontrol menggunakan Python untuk menjaga konsistensi hasil pengukuran. Hasil penelitian menunjukkan bahwa AES memiliki performa yang lebih unggul dibandingkan RC6, ditunjukkan oleh waktu enkripsi dan dekripsi yang lebih cepat serta nilai throughput yang lebih tinggi dan stabil pada seluruh skenario pengujian. Sebaliknya, RC6 memiliki beban komputasi yang lebih tinggi akibat penggunaan operasi aritmatika kompleks sehingga menghasilkan waktu proses yang lebih lama dan performa yang kurang stabil. Selain itu, ukuran dan jenis file terbukti berpengaruh signifikan terhadap kinerja algoritma, dimana file berukuran besar dan kompleks membutuhkan waktu pemrosesan yang lebih tinggi. Penelitian ini memberikan kontribusi berupa evaluasi komprehensif lintas format multimedia sebagai dasar dalam pemilihan algoritma kriptografi yang efisien pada implementasi nyata
Unduhan
Referensi
M. A. Jimale et al., “Authenticated encryption schemes: A systematic review,” IEEE Access, vol. 10, pp. 14739–14766, 2022, doi: 10.1109/ACCESS.2022.3147201.
S. Balli and M. Yilmaz, “Multi-criteria usability evaluation of symmetric data encryption algorithms in fuzzy environment,” SN Appl. Sci., vol. 2, p. 1393, 2020, doi: 10.1007/s42452-020-3170-9.
X. Zhang, Y. Liu, and Z. Wang, “Improved RC6 block cipher,” Comput. Mater. Contin., vol. 70, no. 1, pp. 1123–1137, 2021.
H. Kaur and M. Singh, “Performance evaluation of symmetric encryption algorithms for multimedia data,” Int. J. Comput. Appl., vol. 183, no. 4, pp. 1–6, 2021.
S. Gafur and E. Aribowo, “Studi Pendekatan Quality & Differential Analysis terhadap Kinerja Algoritma {AES}-{CBC} pada Enkripsi Gambar,” J. Teknol. Inf. dan Ilmu Komput., vol. 12, no. 5, pp. 1115–1122, 2025.
M. B. B. Timur, Royansyah, and D. Kusumaningsih, “Comparison of Efficiency and Security of {AES}, Blowfish, and ChaCha20 Cryptographic Algorithms on Image and Document Files,” Innov. Res. Informatics, vol. 7, no. 2, pp. 96–102, 2025, doi: 10.37058/innovatics.v7i2.15748.
S. Basu, S. Roy, and A. Mukherjee, “Multimedia data encryption using symmetric cryptography: A performance perspective,” Multimed. Tools Appl., vol. 82, pp. 21435–21458, 2023.
W. Gondowarsito, “Multi-Format Data Encryption and Decryption with {AES} Cipher Block Chaining in Python,” Crossroad Res. J., vol. 2, no. 2, pp. 56–65, 2025, doi: 10.61402/crj.v2i2.348.
A. F. Pranata, A. F. Saragih, R. Fikri, K. Rahmadani, and N. P. Aulia, “Analisis Perbandingan Enkripsi dan Dekripsi Menggunakan Algoritma Simetris {AES} dan Hybrid ({AES} + {RSA}) Pada File Video,” JIKUM J. Ilmu Komput., vol. 2, no. 1, pp. 102–107, 2026, doi: 10.62671/jikum.v2i1.143.
R. B. Alothman, I. I. Saada, and B. S. B. Al-Brge, “A Performance-Based Comparative Encryption and Decryption Technique for Image and Video for Mobile Computing,” J. Cases Inf. Technol., vol. 24, no. 2, pp. 1–18, 2022, doi: 10.4018/JCIT.20220101.oa1.
A. Arifin and M. Rizal, “Implementasi Sistem Otomatisasi Perawatan Tanaman indoor berbasis Internet of Things (IoT),” remik, vol. 7, no. 2, pp. 935–945, 2023, doi: 10.33395/remik.v7i2.12277.
P. Matta, “A comparative survey on data encryption techniques: Big data perspective,” Mater. Today Proc., vol. 51, pp. 776–779, 2021, doi: 10.1016/j.matpr.2021.05.415.
R. B. Alothman, “A performance-based comparative study of symmetric encryption algorithms,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 6, pp. 3275–3285, 2022.
M. A. Khan, A. U. Rehman, and M. K. Khan, “Performance evaluation of AES for secure multimedia communication,” IEEE Access, vol. 10, pp. 84567–84580, 2022.
R. B. Alothman, “A performance-based comparative encryption analysis,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 6, pp. 3275–3285, 2022.
A. P. U. Siahaan, “Secure image encryption using AES,” in Information Technology Conference, 2024.
Unduhan
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 Sugiyatno Sugiyatno, Hafidz Maulana Rahman

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).























