DESCRIPTIVE EXPLORATION OF THE USE OF CRYPTOGRAPHY TO PROTECT DATA ACROSS DIFFERENT FILE SIZES

Authors

  • Akmal Baihaqi State Islamic University of North Sumatra, Indonesia Author
  • Ibnu Ruysdi State Islamic University of North Sumatra, Indonesia Author
  • Intan Widya Saputri Nst State Islamic University of North Sumatra, Indonesia Author

Keywords:

Cryptography, Encryption, File Size, Data Protection

Abstract

The increasing volume and diversity of digital files have heightened the need for effective data protection mechanisms. Cryptography, particularly encryption, is widely recognized as a fundamental control for safeguarding data confidentiality. However, in practical environments, the way encryption is applied often varies depending on file size, usability considerations, and workflow requirements. This study aims to descriptively explore the use of cryptography to protect data across different file sizes small, medium, and large using a qualitative descriptive method based on an internet literature study. Data were collected from authoritative standards, prior academic research, and reputable industry reports available online. The analysis focused on identifying common patterns of encryption usage, implementation approaches, and practical considerations related to file size. The findings indicate that small files are typically protected through simple, user-driven encryption methods to support ease of sharing, while medium-sized files are often bundled into encrypted containers for efficiency. Large files, such as backups and system images, tend to rely on system-level or automated encryption solutions to ensure scalability and consistency. Overall, the study highlights that implementation choices, usability, and key management practices are more influential than algorithm selection alone. This descriptive exploration provides practical insights for students, practitioners, and organizations seeking to apply cryptography effectively in real-world file protection scenarios

Downloads

Download data is not yet available.

References

Aprilia, N. F., Mafa, D., Muchtar, A. R., Rohim, K. A. A., & Firdaus, R. U. N. I. (2023). Penerapan Algoritma AES untuk Enkripsi pada Halaman Register serta Penerapan AES untuk Deskripsi pada Halaman Login Website. Journal of Informatics Development, 1(2), 75-82.

Firdaus, D., & Dafy, M. Z. (2024). Peningkatan Keamanan dan Privasi Aplikasi Website DNA Sequencing Menggunakan Enkripsi AES 256 dan Query Parameterization. Simpatik: Jurnal Sistem Informasi dan Informatika, 4(2), 79-88

Jati, M. A. H., Chrisnanto, Y. H., & Abdillah, G. (2024). PENGAMANAN DATA EKSTENSI FILE PDF DENGAN ALGORITMA AES DAN OTP. Jurnal Informatika Teknologi dan Sains (Jinteks), 6(3), 648-658.

Kautsar, A., & Ikhsan, M. (2025). Implementation of the Advanced Encryption Standard (AES) Algorithm and Bit Plane Complexity Segmentation (BPCS) Steganography Technique for Enhancing Text File Security. SISTEMASI, 14(2), 956-968.

Maulana, H., Tahir, M., Farrohah, N., Maulana, F., & Aprilianyani, R. R. (2025). PERANCANGAN SISTEM KEAMANAN FILE MENGGUNAKAN HYBRID ENCRYPTION UNTUK PERLINDUNGAN DATA. Jurnal RESTIKOM: Riset Teknik Informatika dan Komputer, 7(1), 87-96.

Nurrochim, A. (2025). Implementasi Kriptografi AES dan Steganografi Untuk Keamanan Data Customer dan Transaksi di PT Guna Bangun Jaya (LEMKRA). Journal of Syntax Literate, 10(10).

Pakan, P. V., & Soetanto, H. (2025). IMPLEMENTASI KRIPTOGRAFI UNTUK MELINDUNGI INFORMASI TRANSAKSI PADA E-COMMERCE MENGGUNAKAN METODE CAESAR CIPHER DAN RC4. JIFOSI, 6(2), 37-47.

Raharjo, T. (2025). Analisis Penerapan Metode Enkripsi AES dan Kompresi LZMA untuk Keamanan Dokumen Medis Elektronik (Doctoral dissertation, Universitas Islam Indonesia).

Ramadhani, D. E., Sabrina, P. N., & Ashaury, H. (2025). Implementasi Algoritma Enkripsi Blowfish dan Rijndael dalam Pengamanan File Text. Jurnal Locus Penelitian dan Pengabdian, 4(8), 7534-7544.

Siagian, A. A., & Indra, Z. (2025). ANALISIS TEKNIK PLAYFAIR DAN SHIFT CIPHER SEBAGAI METODE KRIPTOGRAFI KLASIK UNTUK KEAMANAN DATA. Jurnal Komputer dan Teknologi, 4(1), 13-19.

Simanjuntak, V., Silalahi, D. K., & Pasaribu, Y. P. (2025). Hybrid Cryptosystem dengan Algoritma 3DES dan AES dalam Pengamanan File Text. JURNAL QUANCOM: QUANTUM COMPUTER JURNAL, 3(2), 26-34.

WIDYANTO, A. (2024). IMPLEMENTASI KRIPTOGRAFI TEKS MENGGUNAKAN RSA. Community Service Articles, 1(2), 70-81.

Downloads

Published

2026-01-16

Issue

Section

Articles

How to Cite

Akmal Baihaqi, Ibnu Ruysdi, & Intan Widya Saputri Nst. (2026). DESCRIPTIVE EXPLORATION OF THE USE OF CRYPTOGRAPHY TO PROTECT DATA ACROSS DIFFERENT FILE SIZES. Interdisciplinary Journal of Global and Multidisciplinary, 2(1), 753-762. https://jurnal-ijgam.or.id/index.php/IJGAM/article/view/157

Similar Articles

1-10 of 84

You may also start an advanced similarity search for this article.