PERBANDINGAN ALGORITMA DES, AES, IDEA, DAN BLOWFISH BERDASARKAN PANJANG KUNCI DAN CIPHERTEXT SEBAGAI INDIKATOR KEAMANAN DATA
Abstract
The rapid growth of information technology has increased the need for secure data transmission, making cryptography a fundamental component of computer security systems. Symmetric cryptographic algorithms play an important role in protecting data confidentiality by transforming plaintext into ciphertext that is difficult to interpret by unauthorized parties. This study aims to compare the symmetric cryptographic algorithms DES, AES, IDEA, and Blowfish based on key length and ciphertext length as indicators of data security. The research utilizes a dataset consisting of 120,000 encryption records containing information on algorithm type, key length, and ciphertext length. The analysis is conducted using a descriptive comparative approach to evaluate differences in security characteristics among the algorithms. Key length is analyzed as an indicator of resistance to brute-force attacks, while ciphertext length is examined to assess encryption complexity and data transformation behavior. The results show that DES has the shortest key length and produces relatively less complex ciphertext, indicating lower security. IDEA demonstrates moderate security characteristics, while AES and Blowfish exhibit larger and more flexible key lengths along with more varied ciphertext patterns. These characteristics suggest that AES and Blowfish provide higher security compared to DES and IDEA. This study concludes that key length and ciphertext characteristics can be used as preliminary indicators in evaluating the relative security of symmetric cryptographic algorithms. However, this research does not include performance testing or cryptanalysis simulations, which can be explored in future studies.
References
Winda, L. Surimi, And I. J. Efendi, “Implementasi Algoritma Kriptografi Blowfish Untuk Pengamanan File Berbasis Desktop Winda*1,” J. Teknol. Inf. Dan Komput., Vol. 3, No. 1, Pp. 42–49, 2025.
Y. Iswo And P. Sihombing, “Combination Of Aes Algorithm With Blowfish Algorithm For File Attachment At E-Mail Sending,” Vol. 2, No. 1, Pp. 96–101, 2016.
M. Zulfikar, T. Imanuddin, N. E. Prastyo, S. A. Firmansyah, And R. A. Alhad, “Analisis Perbandingan Tingkat Kompleksitas Waktu Enkripsi Dan Tingkat Keamanan Enkripsi Pada Algoritma Kriptografi Rsa, Des, Aes,” Vol. 2, No. 2, Pp. 26–33, 2023.
R. K. Muhammed Et Al., “Comparative Analysis Of Aes, Blowfish, Twofish, Salsa20, And Chacha20 For Image Encryption,” 2024.
T. A. Ramadhani, A. F. Cobantoro, T. Informatika, F. Teknik, And U. M. Ponorogo, “Implementasi Algoritma Advanced Encryption Standard 128 Untuk Pengamanan Database Sistem,” Pp. 521–526, 2022.
D. Klinc, C. Hazay, A. Jagmohan, H. Krawczyk, And T. Rabin, “On Compression Of Data Encrypted With Block Ciphers,” Pp. 1–27, 2010.
M. Yuliana, N. Hidayah, And A. Sudarsono, “Implementation Of Web-Based File Sharing Security System Implementasi Sistem Keamanan Berbagi File Berbasis Website,” J. Mech. Electr. Ind. Eng., Pp. 41–52, 2024.
S. Oktavani, F. Rizky, And I. Gunawan, “Analisis Keamanan Data Dengan Menggunakan Kriptografi Modern Algoritma Advance Encryption Standar ( Aes ) Jurnal Media Informatika [ Jumin ],” Vol. 4, Pp. 97–101, 2023.
Z. S. Gandhara, T. P. Satria, H. Saragih, And M. N. N. Abror, “Evaluasi Kinerja Algoritma Kriptografi Dalam Pengamanan Video : Studi Perbandingan Aes , Des Dan Blowfish,” Vol. 2, No. 2, 2025.
A. H. Putri And Y. Kusumawati, “Strategi Mitigasi Risiko Aset Kritis Teknologi Informasi Menggunakan Metode Octave Dan Fmea,” Techno.Com, Vol. 16, No. 4, Pp. 367–377, 2017.
D. A. Meko, “Jurnal Teknologi Terpadu Perbandingan Algoritma Des , Aes , Idea Dan Blowfish Dalam Enkripsi Dan Dekripsi Data Donzilio Antonio Meko Program Studi Teknik Informatika , Stimik Kupang Jurnal Teknologi Terpadu,” Vol. 4, No. 1, Pp. 8–15, 2018.
P. A. Rizky, S. Soim, And Sholihin, “Implementasi Algoritma Kriptografi Aes Cbc Untuk Keamanan Komunikasi Data Pada Hardware,” Vol. 3, No. 1, Pp. 71–78, 2024.
G. F. Elkabbany, H. K. Aslan, And M. N. Rasslan, “A Design Of A Fast Parallel -Pipelined Implementation Of Aes : Advanced Encryption Standard,” Int. J. Comput. Sci. Inf. Technol., Vol. 6, No. 6, Pp. 39–59, 2014, Doi: 10.5121/Ijcsit.2014.6603.
F. Hidayatuloh, Y. Amila, M. Naufal, N. Akbar, And S. Maesaroh, “Komparasi Performa Dan Keamanan Algoritma Aes-128 Dan Blowfish Pada Enkripsi Berkas Teks,” J. Ilm. Multidisiplin, Vol. 2, No. 1, Pp. 1674–1677, 2026.
A. A. Permana And D. Nurnaningsih, “Rancangan Aplikasi Pengamanan Data Dengan Algoritma Advanced Encyption Standard ( Aes ),” Vol. 11, No. 2, 2018.







