Integration of Key Derivation Function (KDF) Development for Advanced Encryption Standard (AES) 256 Key Generator in Digital File Security
DOI:
https://doi.org/10.59934/jaiea.v5i1.1645Keywords:
AES, Cryptography, File Security, KDF, PythonAbstract
Digital file security has become increasingly crucial along with the rapid development of information technology. The Advanced Encryption Standard (AES) 256 bit algorithm is a strong cryptographic solution; however, its effectiveness greatly depends on the quality of the encryption key used. The use of weak keys can significantly reduce the level of security. This research aims to enhance the security of the AES key generation process by integrating the development of a Key Derivation Function (KDF). The proposed KDF utilizes a 512 bit external key that is divided into two blocks, processed using an XOR operation, and subsequently transformed with the AES SubBytes substitution to generate a more complex 256 bit derived key. The system is implemented as a desktop application with a graphical user interface (GUI) using the Python programming language with the tkinter and cryptography libraries. The test results show that the application successfully encrypts and decrypts various digital file formats (.pdf, .docx, .xlsx, .png, .mp3, and .mp4). Encrypted files cannot be accessed and can only be restored to their original form through the decryption process with the correct key. The integration of this KDF has proven effective in strengthening the key for the AES 256 algorithm, thereby providing an additional security layer to protect digital files from unauthorized access.
Downloads
References
E. Soesanto, A. Romadhon, B. D. Mardika, and M. F. Setiawan, “Analisis dan Peningkatan Keamanan Cyber: Studi Kasus Ancaman dan Solusi dalam Lingkungan Digital Untuk Mengamankan Objek Vital dan File,” Sammajiva: Jurnal Penelitian Bisnis dan Manajemen, vol. 1, no. 2, pp. 172–191, Jun. 2023, doi: 10.47861/sammajiva.v1i2.226.
R. Ghinaa Sinambela, A. Fauzi, and H. Khair, “Enhancing AES Key Generation Using Diffie-Hellman Method for Image Security,” 2024. [Online]. Available: https://ioinformatic.org/
C. W. Chuah, N. Z. Harun, and I. R. A. Hamid, “Key Derivation Function: Key-Hash Based Computational Extractor And Stream Based Pseudorandom Expander,” PeerJ Comput Sci, vol. 10, p. e2249, Aug. 2024, doi: 10.7717/PEERJ-CS.2249/SUPP-1.
AR. Nurjaman and A. T. Turnip, “Kombinasi Algoritma Kriptografi AES-256 Dan SHA3-512 Untuk Meningkatkan Keamanan Dokumen PDF,” 2024.
Muh. Fitrah and D. Kusnadi, “Integrasi Nilai-Nilai Islam Dalam Membelajarkan Matematika Sebagai Bentuk Penguatan Karakter Peserta Didik,” 2022.
B. D. Kurniawan, M. A. Rosid, I. A. Kautsar, and N. E. Pratama, “Rancang Bangun Library Web Token untuk Enkripsi HTTP Data Menggunakan Eksklusif-OR (XOR),” Physical Sciences, Life Science and Engineering, vol. 1, no. 1, p. 14, Jan. 2024, doi: 10.47134/pslse.v1i1.164.
Z. Fauziah and I. I. Lawanda, “Pengelolaan Arsip Digital Pribadi: Studi Kasus Mahasiswa Manajemen Rekod Dan Arsip Ui,” Multikultura, Oct. 2024, doi: 10.7454/multikultura.v3i4.1069.
Hayyina Farahdiba, Christian Wiradendi Wolor, and Marsofiyati Marsofiyati, “Analisis Pengelolaan Arsip Digital Pada PT Anugrah Alam Karunia Abadi,” Journal Of Administrative And Social Science, vol. 5, no. 1, pp. 41–53, Dec. 2023, doi: 10.55606/jass.v5i1.807.
N. Sitohang, “Penerapan Metode Five Modulus Dalam Mengkompresi File Dokumen (PDF) Pengembangan Bahan Ajar,” Bulan Februari, 2023.
Maolana, “Analisis Perbandingan Hasil Kompresi Citra Format PNG dengan SVG untuk Penyimpanan File Gambar,” vol. 29, 2024.
T. B. Situmorang, “Perancangan Aplikasi Kompresi File MP3 Dengan Menggunakan Algoritma Lempel Ziv Welch (LZW),” 2023.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.







