DESIGN OF FILE ENCRYPTION AND DECRYPTION APPLICATION USING AES-256 CRYPTOGRAPHY ALGORITHM BASED ON STREAMLIT

Authors

  • Arditya Adjie Rosandi Universitas Esa Unggul
  • Dhicky Hariyadi Supriyono Universitas Esa Unggul
  • Teguh Tegar Aulia Universitas Esa Unggul
  • Jefry Sunupurwa Asri Universitas Esa Unggul

DOI:

https://doi.org/10.53067/ijomral.v5i1.418

Keywords:

cryptography, AES‑256, file encryption, Streamlit, data security, PBKDF2

Abstract

The widespread use of personal computing devices has led to an increasing number of sensitive documents, including digital files, lacking adequate cryptographic protection, raising the risk of data leakage and misuse. The Advanced Encryption Standard (AES) with a 256-bit key length is a symmetric-key cryptographic algorithm recommended for protecting data confidentiality due to its strong security and excellent performance. This study designs and implements a simple web-based application for file encryption and decryption using the AES-256 algorithm with a password-based key, built on the Streamlit framework. Key generation uses PBKDF2-HMAC-SHA256 with a random salt and a sufficient number of iterations, while data encryption uses AES-GCM, which provides confidentiality and integrity authentication. The application enables users to upload files, encrypt them into .enc ciphertext files, and restore them to their original form via a web interface, eliminating the need for direct command-line interaction. Experiments using several test files of varying sizes to assess the success of the encryption/decryption processes and estimate processing times. Furthermore, to ensure that data could not be accessed without the correct key, negative tests were conducted using erroneous passwords. All test files can be successfully encrypted and decrypted; encrypted files cannot be read directly; and the overhead of encryption and decryption is manageable for everyday use. The prototype app is a suitable solution to enhance the security of local file storage.

Downloads

Download data is not yet available.

References

Bishop, M. (2018). Computer security: Art and science (2nd ed.). Addison-Wesley.

Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography engineering: Design principles and practical applications. Wiley.

Ganesh, R. (2025). A panoramic survey of the advanced encryption standard. Security and Communication Networks. https://doi.org/10.1007/s10207-025-01116-x

National Institute of Standards and Technology. (2007). Recommendation for block cipher modes of operation: Galois/Counter Mode (GCM) (NIST SP 800-38D). U.S. Department of Commerce.

National Institute of Standards and Technology. (2010). Recommendation for password-based key derivation (NIST SP 800-132). U.S. Department of Commerce.

National Institute of Standards and Technology. (2023). FIPS PUB 197: Advanced Encryption Standard (AES). U.S. Department of Commerce. https://doi.org/10.6028/NIST.FIPS.197-2023

Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal.

Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson.

Streamlit. (2024). Streamlit documentation and framework overview.

Downloads

Published

2026-01-10

How to Cite

Rosandi, A. A. ., Supriyono, D. H. ., Aulia, T. T. ., & Asri, J. S. . (2026). DESIGN OF FILE ENCRYPTION AND DECRYPTION APPLICATION USING AES-256 CRYPTOGRAPHY ALGORITHM BASED ON STREAMLIT. International Journal of Multidisciplinary Research and Literature, 5(1), 162–168. https://doi.org/10.53067/ijomral.v5i1.418