Implementation of Base 64 and AES Algorithms in Web-Based Email Message Security System
DOI:
https://doi.org/10.59934/jaiea.v5i1.1578Keywords:
AES 256 bit algorithm , Base64 algorithm , Email messages , Security MessageAbstract
This research is motivated by the increasing threat to message security in email communications due to the rapid development of information technology. To address this, this study aims to implement and test a web-based email message security system that combines Base64 and AES 256-bit algorithms to protect text messages and attachments from security threats. This system was developed using the PHP programming language and functions as an internal messaging system. The results show that the combination of the two algorithms successfully creates a system capable of securing messages strongly. During the delivery process, the system performs AES 256 encryption and Base64 encoding on messages and attachments. Meanwhile, when a message is received, the user must first enter the same key, after which the system will perform Base64 decoding and continue with AES 256 decryption to restore the message to its original form. Thus, the resulting system is proven effective in securing digital communications and ensuring that messages can only be accessed by authorized recipients.
Downloads
References
] SA Dimas Bayu Nurcahyo., "Dimas Bayu Nurcahyo., & Safrina Amini (2018), Implementation of Cryptography with Base64 Algorithm and Advance Encryption Standard to Secure Web-Based Email Data," 2018.
] GWRF &. AV (. IAA 2. CB 6. DS 2. DPDVDUO Ferzha Putra Utama., "Ferzha Putra Utama., Gusman Wijaya., Ruvita Faurina., & Arie Vatresia4 (2023), Implementation of Aes 256 Cbc, Base 64, and Sha 256 Algorithms in Securing and Validating Online Exam Data," 2023.
] P. Agung Docman Priatama1., "Agung Docman Priatama1., & Painem (2023), Securing Polri Member Data Files Using Aes-128 and Base64 at the Bogor Police Research and Development Center Security of Polri Member Data Files Using Aes-128 and Base64 Method, Bogor Police Research and Development Center," 2023.
] A. Karmakar, S. S. Roy, F. Vercauteren, and I. Verbauwhede, “Efficient finite field multiplication for isogeny based post quantum cryptography,” 2017, doi: 10.1007/978-3-319-55227-9_14.
] A. M. H. Pardede, M. Zarlis, and H. Mawengkang, “Optimization of Health Care Services with Limited Resources,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 9, no. 4, pp. 1444–1449, 2019, doi: 10.18517/ijaseit.9.4.8348.
] A. M. H. Pardede, Y. Maulita, and R. Buaton, “Application modeling ipv6 (internet protocol version 6) on e-id card for identification number for effectiveness and efficiency of registration process identification of population,” in Journal of Physics: Conference Series, 2018, vol. 978, no. 1, doi: 10.1088/1742-6596/978/1/012017.
] S. P. Mohanty, U. Choppali, and E. Kougianos, “Everything you wanted to know about smart cities,” IEEE Consum. Electron. Mag., vol. 5, no. 3, pp. 60–70, 2016, doi: 10.1109/MCE.2016.2556879.
] W. A. Jabbar, W. K. Saad, and M. Ismail, “MEQSA-OLSRv2: A multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT,” IEEE Access, 2018, doi: 10.1109/ACCESS.2018.2882853.
] D. Niyigena, C. Habineza, and T. S. Ustun, “Computer-based smart energy management system for rural health centers,” 2016, doi: 10.1109/IRSEC.2015.7455005.
] F.-Z. Younsi, A. Bounnekar, D. Hamdadou, and O. Boussaid, “SEIR-SW, Simulation Model of Influenza Spread Based on the Small World Network,” Tsinghua Sci. Technol., vol. 20, no. 5, pp. 460–473, 2015.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.







