DESIGN OF FILE ENCRYPTION AND DECRYPTION APPLICATION USING AES-256 CRYPTOGRAPHY ALGORITHM BASED ON STREAMLIT
DOI:
https://doi.org/10.53067/ijomral.v5i1.418Keywords:
cryptography, AES‑256, file encryption, Streamlit, data security, PBKDF2Abstract
The widespread use of personal computing devices has led to an increasing number of sensitive documents, including digital files, lacking adequate cryptographic protection, raising the risk of data leakage and misuse. The Advanced Encryption Standard (AES) with a 256-bit key length is a symmetric-key cryptographic algorithm recommended for protecting data confidentiality due to its strong security and excellent performance. This study designs and implements a simple web-based application for file encryption and decryption using the AES-256 algorithm with a password-based key, built on the Streamlit framework. Key generation uses PBKDF2-HMAC-SHA256 with a random salt and a sufficient number of iterations, while data encryption uses AES-GCM, which provides confidentiality and integrity authentication. The application enables users to upload files, encrypt them into .enc ciphertext files, and restore them to their original form via a web interface, eliminating the need for direct command-line interaction. Experiments using several test files of varying sizes to assess the success of the encryption/decryption processes and estimate processing times. Furthermore, to ensure that data could not be accessed without the correct key, negative tests were conducted using erroneous passwords. All test files can be successfully encrypted and decrypted; encrypted files cannot be read directly; and the overhead of encryption and decryption is manageable for everyday use. The prototype app is a suitable solution to enhance the security of local file storage.
Downloads
References
Bishop, M. (2018). Computer security: Art and science (2nd ed.). Addison-Wesley.
Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography engineering: Design principles and practical applications. Wiley.
Ganesh, R. (2025). A panoramic survey of the advanced encryption standard. Security and Communication Networks. https://doi.org/10.1007/s10207-025-01116-x
National Institute of Standards and Technology. (2007). Recommendation for block cipher modes of operation: Galois/Counter Mode (GCM) (NIST SP 800-38D). U.S. Department of Commerce.
National Institute of Standards and Technology. (2010). Recommendation for password-based key derivation (NIST SP 800-132). U.S. Department of Commerce.
National Institute of Standards and Technology. (2023). FIPS PUB 197: Advanced Encryption Standard (AES). U.S. Department of Commerce. https://doi.org/10.6028/NIST.FIPS.197-2023
Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal.
Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson.
Streamlit. (2024). Streamlit documentation and framework overview.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Arditya Adjie Rosandi, Dhicky Hariyadi Supriyono, Teguh Tegar Aulia, Jefry Sunupurwa Asri

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.











