Penerapan Keamanan AES-256 Pada Sistem Kehadiran Karyawan Berbasis Kordinat
DOI:
https://doi.org/10.31599/0kjq9s40Keywords:
Attendance System, Data Security, AES-256, Coordinates, CryptographyAbstract
The development of information technology has encouraged the implementation of coordinate-based employee attendance systems to improve accuracy and minimize fraud in attendance recording. However, this system poses security risks to sensitive data, such as employee identities, attendance timestamps, and location coordinates. Therefore, a reliable data security mechanism is required. This study aims to implement the Advanced Encryption Standard (AES) algorithm with a 256-bit key length in a coordinate-based employee attendance system to enhance data security. The research method used is an experimental method consisting of requirement analysis, system design, implementation of the AES-256 algorithm, and system testing stages. The results show that the implementation of AES-256 is able to encrypt attendance data effectively so that the data cannot be directly read without a decryption process. In addition, the encryption and decryption processes do not have a significant impact on system performance. Thus, the AES-256 algorithm can be effectively applied to improve security in coordinate-based employee attendance systems.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Dani Yusuf , Uus Rusmawan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Please read and understand the copyright terms for submissions to this journal.
Copyright Notice
TheĀ Jurnal Keamanan NasionalĀ is under the Creative Commons Attribution 4.0 International (CC-BY 4.0) License, according to which:
1) Authors retain copyright and grant the journal the right to first publication, with the work simultaneously licensed under the Creative Commons Attribution (CC-BY 4.0) that allows the sharing of articles published with the acknowledgement of authorship and the initial publication in this journal.
2) The authors are authorized to make additional contracts separately for distribution of the version of the work published in this journal (for example, publication in an institutional repository or as a chapter of the book), as long as there is recognition of authorship and initial publication in this journal.
3) Authors are authorized and encouraged to publish and distribute their work online (for example, in institutional repositories or on their personal pages) at any time before or during the editorial process, as it increases the impact and reference of the published work.



2.jpg)


_-_Copy1.jpg)