DESCRIPTIVE EXPLORATION OF THE USE OF CRYPTOGRAPHY TO PROTECT DATA ACROSS DIFFERENT FILE SIZES
Keywords:
Cryptography, Encryption, File Size, Data ProtectionAbstract
The increasing volume and diversity of digital files have heightened the need for effective data protection mechanisms. Cryptography, particularly encryption, is widely recognized as a fundamental control for safeguarding data confidentiality. However, in practical environments, the way encryption is applied often varies depending on file size, usability considerations, and workflow requirements. This study aims to descriptively explore the use of cryptography to protect data across different file sizes small, medium, and large using a qualitative descriptive method based on an internet literature study. Data were collected from authoritative standards, prior academic research, and reputable industry reports available online. The analysis focused on identifying common patterns of encryption usage, implementation approaches, and practical considerations related to file size. The findings indicate that small files are typically protected through simple, user-driven encryption methods to support ease of sharing, while medium-sized files are often bundled into encrypted containers for efficiency. Large files, such as backups and system images, tend to rely on system-level or automated encryption solutions to ensure scalability and consistency. Overall, the study highlights that implementation choices, usability, and key management practices are more influential than algorithm selection alone. This descriptive exploration provides practical insights for students, practitioners, and organizations seeking to apply cryptography effectively in real-world file protection scenarios
Downloads
References
Aprilia, N. F., Mafa, D., Muchtar, A. R., Rohim, K. A. A., & Firdaus, R. U. N. I. (2023). Penerapan Algoritma AES untuk Enkripsi pada Halaman Register serta Penerapan AES untuk Deskripsi pada Halaman Login Website. Journal of Informatics Development, 1(2), 75-82.
Firdaus, D., & Dafy, M. Z. (2024). Peningkatan Keamanan dan Privasi Aplikasi Website DNA Sequencing Menggunakan Enkripsi AES 256 dan Query Parameterization. Simpatik: Jurnal Sistem Informasi dan Informatika, 4(2), 79-88
Jati, M. A. H., Chrisnanto, Y. H., & Abdillah, G. (2024). PENGAMANAN DATA EKSTENSI FILE PDF DENGAN ALGORITMA AES DAN OTP. Jurnal Informatika Teknologi dan Sains (Jinteks), 6(3), 648-658.
Kautsar, A., & Ikhsan, M. (2025). Implementation of the Advanced Encryption Standard (AES) Algorithm and Bit Plane Complexity Segmentation (BPCS) Steganography Technique for Enhancing Text File Security. SISTEMASI, 14(2), 956-968.
Maulana, H., Tahir, M., Farrohah, N., Maulana, F., & Aprilianyani, R. R. (2025). PERANCANGAN SISTEM KEAMANAN FILE MENGGUNAKAN HYBRID ENCRYPTION UNTUK PERLINDUNGAN DATA. Jurnal RESTIKOM: Riset Teknik Informatika dan Komputer, 7(1), 87-96.
Nurrochim, A. (2025). Implementasi Kriptografi AES dan Steganografi Untuk Keamanan Data Customer dan Transaksi di PT Guna Bangun Jaya (LEMKRA). Journal of Syntax Literate, 10(10).
Pakan, P. V., & Soetanto, H. (2025). IMPLEMENTASI KRIPTOGRAFI UNTUK MELINDUNGI INFORMASI TRANSAKSI PADA E-COMMERCE MENGGUNAKAN METODE CAESAR CIPHER DAN RC4. JIFOSI, 6(2), 37-47.
Raharjo, T. (2025). Analisis Penerapan Metode Enkripsi AES dan Kompresi LZMA untuk Keamanan Dokumen Medis Elektronik (Doctoral dissertation, Universitas Islam Indonesia).
Ramadhani, D. E., Sabrina, P. N., & Ashaury, H. (2025). Implementasi Algoritma Enkripsi Blowfish dan Rijndael dalam Pengamanan File Text. Jurnal Locus Penelitian dan Pengabdian, 4(8), 7534-7544.
Siagian, A. A., & Indra, Z. (2025). ANALISIS TEKNIK PLAYFAIR DAN SHIFT CIPHER SEBAGAI METODE KRIPTOGRAFI KLASIK UNTUK KEAMANAN DATA. Jurnal Komputer dan Teknologi, 4(1), 13-19.
Simanjuntak, V., Silalahi, D. K., & Pasaribu, Y. P. (2025). Hybrid Cryptosystem dengan Algoritma 3DES dan AES dalam Pengamanan File Text. JURNAL QUANCOM: QUANTUM COMPUTER JURNAL, 3(2), 26-34.
WIDYANTO, A. (2024). IMPLEMENTASI KRIPTOGRAFI TEKS MENGGUNAKAN RSA. Community Service Articles, 1(2), 70-81.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Akmal Baihaqi, Ibnu Ruysdi, Intan Widya Saputri Nst (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

