Analisi Perbandingan Kinerja Algoritma AES-128 GCM dan AES-256 GCM Pada Protokol TLS 1.2 Di Server Ngnix
DOI:
https://doi.org/10.62951/router.v3i4.743Keywords:
AES, Cloud Storage, Nginx, Throughput, TLS 1.2Abstract
While TLS 1.3 is the latest standard, TLS 1.2 remains widely implemented in many cloud infrastructures. The selection of cipher suites in TLS 1.2, particularly between AES-128-GCM and AES-256-GCM, presents a trade-off between cryptographic strength and system performance. This research aims to analyze the performance comparison of these two algorithms on an Nginx server to determine the optimal configuration for cloud storage services. The study uses a quantitative experimental method by benchmarking two scenarios: (A) Strict (AES-256-GCM), and (B) Balanced (AES-128-GCM). Performance metrics measured include Requests Per Second (RPS), Latency, and Throughput. The results show that handshake performance (RPS and Latency) is nearly identical across all scenarios. However, in large file transfer tests, the AES-128-GCM algorithm (Scenario B) achieved a throughput of 32.4 MB/s, which is 12.5% faster than AES-256-GCM (28.8 MB/s). This study concludes that AES-128-GCM provides the best balance of security and efficiency for data-intensive environments.
Downloads
References
Agustiara, W., Pratama, A., Junaidi, S., Padang, K., & Barat, S. (2022). Analisis keamanan protokol secure socket layer terhadap serangan packet sniffing pada website portal. Jurnal Teknologi Informasi dan Komputer, 6(1). https://doi.org/10.59697/jtik.v6i1.313
Ali, A., & Singh, V. P. (2023). Comparative analysis of transport layer security (TLS) versions. International Journal of Computer Applications. https://doi.org/10.22214/ijraset.2023.57430
Bhargavan, K., Delignat-Lavaud, A., Protzenko, J., Zanella-Béguelin, S., & Zinzindohoué, J. K. (n.d.). Implementing and proving the TLS 1.3 record layer.
Engineering, S. (2025). Analysis of Nginx web server performance using IPv6 with load balancing method based on weighted round robin algorithm scheduling. Journal of Computer Science and Engineering, 8(1), 138–147. https://doi.org/10.20895/inista.v7i2.1107
Erkamim, M., Prihatin, T., Saraswati, S. D., & Tonggiroh, M. (2024). Optimalisasi throughput pada penerapan load balancing dalam jaringan cloud menggunakan round robin dan least connection. Jurnal Sistem Informasi, 5(1), 13–23. https://doi.org/10.61628/jsce.v5i1.1056
Eromosele, C. C. (2025). Evaluating the impact of AES-256 encryption on network performance: An analysis of transfer time, latency, and throughput. Network Security Journal, 4(1), 49–58.
Herman, A. M., Wicoksono, W., Panchadria, P. A., Linda, N., & Laela, B. (2025). Performance comparison of NGINX, Apache, and Lighttpd using WRK on a Debian server. Business and Technology, 8(1). https://doi.org/10.32877/bt.v8i1.2661
Informasi, J. T. (2020). Optimasi web server Nginx menggunakan metode reverse proxy di PT Beon Intermedia. Jurnal Teknologi Informasi dan Teknik Komputer, 11(2), 68–73. https://doi.org/10.36382/jti-tki.v11i2.499
Irwanto, D. (2024). File encryption and decryption using algorithm AES-128 bit based website. Journal of Applied Science, 4, 670–677. https://doi.org/10.57152/malcom.v4i2.1305
Maharani, A., Tahir, M., & Buana, D. S. (2025). Penerapan web proxy pada Mikrotik untuk optimalisasi keamanan jaringan wireless LAN di SMKN 1 Bangkalan. Jurnal Aplikasi Teknologi Informasi, 9(4), 6029–6035. https://doi.org/10.36040/jati.v9i4.13950
No, V., Hal, J., Ujung, A. M., Irwan, M., & Nasution, P. (2023). Pentingnya sistem keamanan database untuk melindungi data pribadi. Jurnal Keamanan Data, 1(2), 44–47. https://doi.org/10.47233/jiska.v1i2.929
Nova, M., Br, M., P, A. L., & Sipayung, S. P. (2025). Security analysis of data storage in cloud-based digital archive management systems. International Journal of Digital Archives, 2(3), 80–83. https://doi.org/10.29103/jacka.v2i3.22436
Petrović, T. (2024). Impact of database encryption on web application. Proceedings of SINTEZA, 82–87. https://doi.org/10.15308/Sinteza-2024-82-87
Subha, R., Vaijayanth, S., J, S. M., Sanjay, R., & Santhosh, T. (n.d.). Improving data security in cloud computing. International Journal of Computer Applications, 256, 23–27.
Utomo, R. G., & Yasirandi, R. (2024). Exploring trust, privacy, and security in cloud storage adoption among Generation Z: An extended TAM approach. Journal of Information Security, 4(4). https://doi.org/10.22219/kinetik.v9i4.2009
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Router : Jurnal Teknik Informatika dan Terapan

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


