Analisi Perbandingan Kinerja Algoritma AES-128 GCM dan AES-256 GCM Pada Protokol TLS 1.2 Di Server Ngnix

Authors

  • Muhammad Arifin Ilham Universitas Sebelas April Sumedang
  • Dody Herdiana Universitas Sebelas April Sumedang
  • M.Agreindra Helmiawan Universitas Sebelas April Sumedang
  • Asep Saeppani Universitas Sebelas April Sumedang

DOI:

https://doi.org/10.62951/router.v3i4.743

Keywords:

AES, Cloud Storage, Nginx, Throughput, TLS 1.2

Abstract

While TLS 1.3 is the latest standard, TLS 1.2 remains widely implemented in many cloud infrastructures. The selection of cipher suites in TLS 1.2, particularly between AES-128-GCM and AES-256-GCM, presents a trade-off between cryptographic strength and system performance. This research aims to analyze the performance comparison of these two algorithms on an Nginx server to determine the optimal configuration for cloud storage services. The study uses a quantitative experimental method by benchmarking two scenarios: (A) Strict (AES-256-GCM), and (B) Balanced (AES-128-GCM). Performance metrics measured include Requests Per Second (RPS), Latency, and Throughput. The results show that handshake performance (RPS and Latency) is nearly identical across all scenarios. However, in large file transfer tests, the AES-128-GCM algorithm (Scenario B) achieved a throughput of 32.4 MB/s, which is 12.5% faster than AES-256-GCM (28.8 MB/s). This study concludes that AES-128-GCM provides the best balance of security and efficiency for data-intensive environments.

Downloads

Download data is not yet available.

References

Agustiara, W., Pratama, A., Junaidi, S., Padang, K., & Barat, S. (2022). Analisis keamanan protokol secure socket layer terhadap serangan packet sniffing pada website portal. Jurnal Teknologi Informasi dan Komputer, 6(1). https://doi.org/10.59697/jtik.v6i1.313

Ali, A., & Singh, V. P. (2023). Comparative analysis of transport layer security (TLS) versions. International Journal of Computer Applications. https://doi.org/10.22214/ijraset.2023.57430

Bhargavan, K., Delignat-Lavaud, A., Protzenko, J., Zanella-Béguelin, S., & Zinzindohoué, J. K. (n.d.). Implementing and proving the TLS 1.3 record layer.

Engineering, S. (2025). Analysis of Nginx web server performance using IPv6 with load balancing method based on weighted round robin algorithm scheduling. Journal of Computer Science and Engineering, 8(1), 138–147. https://doi.org/10.20895/inista.v7i2.1107

Erkamim, M., Prihatin, T., Saraswati, S. D., & Tonggiroh, M. (2024). Optimalisasi throughput pada penerapan load balancing dalam jaringan cloud menggunakan round robin dan least connection. Jurnal Sistem Informasi, 5(1), 13–23. https://doi.org/10.61628/jsce.v5i1.1056

Eromosele, C. C. (2025). Evaluating the impact of AES-256 encryption on network performance: An analysis of transfer time, latency, and throughput. Network Security Journal, 4(1), 49–58.

Herman, A. M., Wicoksono, W., Panchadria, P. A., Linda, N., & Laela, B. (2025). Performance comparison of NGINX, Apache, and Lighttpd using WRK on a Debian server. Business and Technology, 8(1). https://doi.org/10.32877/bt.v8i1.2661

Informasi, J. T. (2020). Optimasi web server Nginx menggunakan metode reverse proxy di PT Beon Intermedia. Jurnal Teknologi Informasi dan Teknik Komputer, 11(2), 68–73. https://doi.org/10.36382/jti-tki.v11i2.499

Irwanto, D. (2024). File encryption and decryption using algorithm AES-128 bit based website. Journal of Applied Science, 4, 670–677. https://doi.org/10.57152/malcom.v4i2.1305

Maharani, A., Tahir, M., & Buana, D. S. (2025). Penerapan web proxy pada Mikrotik untuk optimalisasi keamanan jaringan wireless LAN di SMKN 1 Bangkalan. Jurnal Aplikasi Teknologi Informasi, 9(4), 6029–6035. https://doi.org/10.36040/jati.v9i4.13950

No, V., Hal, J., Ujung, A. M., Irwan, M., & Nasution, P. (2023). Pentingnya sistem keamanan database untuk melindungi data pribadi. Jurnal Keamanan Data, 1(2), 44–47. https://doi.org/10.47233/jiska.v1i2.929

Nova, M., Br, M., P, A. L., & Sipayung, S. P. (2025). Security analysis of data storage in cloud-based digital archive management systems. International Journal of Digital Archives, 2(3), 80–83. https://doi.org/10.29103/jacka.v2i3.22436

Petrović, T. (2024). Impact of database encryption on web application. Proceedings of SINTEZA, 82–87. https://doi.org/10.15308/Sinteza-2024-82-87

Subha, R., Vaijayanth, S., J, S. M., Sanjay, R., & Santhosh, T. (n.d.). Improving data security in cloud computing. International Journal of Computer Applications, 256, 23–27.

Utomo, R. G., & Yasirandi, R. (2024). Exploring trust, privacy, and security in cloud storage adoption among Generation Z: An extended TAM approach. Journal of Information Security, 4(4). https://doi.org/10.22219/kinetik.v9i4.2009

Downloads

Published

2025-12-31

How to Cite

Muhammad Arifin Ilham, Dody Herdiana, M.Agreindra Helmiawan, & Asep Saeppani. (2025). Analisi Perbandingan Kinerja Algoritma AES-128 GCM dan AES-256 GCM Pada Protokol TLS 1.2 Di Server Ngnix. Router : Jurnal Teknik Informatika Dan Terapan, 3(4), 87–95. https://doi.org/10.62951/router.v3i4.743

Similar Articles

You may also start an advanced similarity search for this article.