Analisis Kinerja Algoritma Kriptografi Kandidat Advanced Encryption Standard (AES) pada Smartphone

  • Ahmad Farisi STMIK GI MDP
Keywords: AES, rijndael, serpent, twofish, encryption, decryption


Rijndael algorithm is the choosen algorithm for AES algorithm. However several previous studies have found the performance of rijndael algorithm on smartphones was under the other AES candidate algorithm such as serpent and twofish. This study compares the performance of rijndael, twofish, and serpent algorithms (the three major AES candidate algorithms) applied to smartphones. This study uses 3 devices with Android operating system and 3 devices with iOS operating system in the experiment. The experiments conducted in this study measure the performance of time, memory usage, and CPU percentage in the process of encryption and decryption performed using different key characters such as alphabet, numeric, alphanumeric, and alphanumeric and symbol. From 720 experiments conducted, this study found that serpent has the fastest time for encryption (0,025 ms) and decryption (0,022 ms). While the most efficient use of memory (0,032 KB) for encryption and decryption is done by twofish and rijndael. And the most efficient percentage of CPU usage (0,025 % for encryption and 0,038% for decryption) is done by serpent. The results of this experiment show that the performance of rijndael on smartphone is not better than other AES candidate algorithms, although the rijndael is the choosen AES algorithm


[1] R. Munir. 2006, Kriptografi, Informatika, Bandung.
[2] D. J Bernstein. 2012, “AES : The Advanced Encryption Standard,” [Online], Available:, [Accessed: 02-Mar-2018].
[3] S. Liang, J. Liu, R. Zhang, and C. Wang. 2010, “A Modified AES Algorithm for The Platform of Smartphone,” Proc. - Int. Conf. Comput. Asp. Soc. Networks,
CASoN’10, pp. 749–752,
[4] H. Xiangyi and L. Tong. 2006, “The Research of Dynamic Symmetric Cipher Algorithm,” Netw. Secur. Technol. Appl., Col. 3.
[5] B. K. Mandal, D. Bhattacharyya, and S. K. Bandyopadhyay. 2013, “Designing and Performance Analysis of A Proposed Symmetric Cryptography Algorithm,”
Proc. - 2013 Int. Conf. Commun. Syst. Netw. Technol. CSNT 2013, pp. 453–461.
[6] A. O. Montoya, M. A. Muñoz, and S. T. Kofuji. 2013, “Performance Analysis of Encryption Algorithms on Mobile Devices,” 47th Int. Carnahan Conf. Secur.
Technol., pp. 1–6.
[7] 2010, “Steps in the AES Encryption Process,” [Online]. Available:
Block+Cipher/Steps+in+the+AES+Encryption+Process/. [Accessed: 22-Feb-2018].
[8] R. Anderson. 2001, “SERPENT - A Candidate Block Cipher for The Advanced Encryption Standard,” University of Cambridge, [Online]. Available: [Accessed: 23-Feb-2018].
[9] B. Schneier, J. Kelsey, D. Whiting, D. Wagner, and C. Hall. 1998, “Twofish : A 128-Bit Block Cipher,” NIST AES Propos., vol. 15, no. 1, pp. 1–27,
[10] A. M. Sagheer, A. A. Abdulhameed, and M. A. Abduljabbar. 2013, “SMS Security for Smartphone,” Proc. - 2013 6th Int. Conf. Dev. eSystems Eng. DeSE 2013, pp.
[11] S. N. Karale, K. Pendke, and P. Dahiwale. 2015, “The Survey of Various Techniques & Algorithms for SMS Security,” ICIIECS 2015 - 2015 IEEE Int. Conf. Innov.
Information, Embed. Commun. Syst.
[12] M. H. Azaim, D. W. Sudiharto, and E. M. Jadied. 2016, “Design and Implementation of Encrypted SMS on Android Smartphone Combining ECDSA - ECDH and
AES,” Proc. - APMediaCast 2016, pp. 18–23.