Implementation of the Advanced Encryption Standard 128 Algorithm in the Web-Based Management Information System

  • Setia Handayani Sinaga Faculty of Engineering, Informatics, Manado State University, Minahasa, Indonesia
  • Quido Conferti Kainde Faculty of Engineering, Informatics, Manado State University, Minahasa, Indonesia
  • Gladly Caren Rorimpandey Faculty of Engineering, Informatics, Manado State University, Minahasa, Indonesia
Keywords: Information Systems, Dormitory Management, Data Security, AES-128, Bit

Abstract

The manual management of student dormitory administration at Manado State University presents several challenges, particularly related to record accuracy, service effectiveness, and information protection. This research focuses on the development of a web-based dormitory management information system using the Advanced Encryption Standard (AES) 128-bit algorithm as a data security mechanism, particularly for payment documents. The research method used is a prototype model, which includes communication, rapid planning, modeling, prototype development, and testing. The system is implemented using PHP and MySQL, with the integration of AES-128 encryption in the payment receipt upload feature to ensure data confidentiality. The results of black-box testing show that all system functions run according to user requirements. The implementation of AES-128 has been proven to maintain the security of sensitive data and increase user trust in the system. Key features provided include user registration, room reservations, payments, facility reporting, and notifications, while administrators are given full access rights to manage resident and room data, as well as encrypt and decrypt important information. Overall, this research produces a system that not only improves the efficiency and effectiveness of dormitory management but also strengthens data security aspects. The developed system has the potential for further enhancement through mobile application integration and the implementation of an automated payment system to be more responsive to user needs. Cryptography is a field of science that utilizes mathematical techniques to ensure data and information security, including authentication, integrity, and validity

References

Alam, M., Rahman, M. S., Rivin, M. A. H., Uddin, M. B., & Sizan, M. M. H. (2024). Development And Implementation Of A Python-Based Hotel Management System: A Comprehensive Tool For Room Reservation, Payment, And Administration. American International Journal of Business and Management Studies, 6(1), 15-44.

Alipour, M., Valipoor, M., Ayati, M., Abasimoghadam, F., & Ahmadi, S. (2024). A Phenomenological Study of Communication Among Female Students in Dormitories: A Case Study of South Khorasan Farhangian University. Journal of Socio-Cultural Studies of Khorasan, 18(4), 129-158. https://doi.org/10.22034/fakh.2024.452653.1662

Altinay, Z., Arslan, R. U., & Sharma, R. C. (2024). Assessing Student Satisfaction and Institutional Efficiency in Dormitory Management: A Qualitative Analysis Based on Student Perspectives. Sustainability (2071-1050), 16(20). https://doi.org/10.3390/su16208823

Amoah, C., Bamfo-Agyei, E., & Simpeh, F. (2025). Student Accommodation Selection Factors: The Perspective of Tertiary Students in Public Universities in Ghana. Journal of Real Estate Literature, 33(1), 40-60. https://doi.org/10.1080/09277544.2024.2426320

Ben Abdessalem Karaa, W., Ben Azzouz, Z., Singh, A., Dey, N., S. Ashour, A., & Ben Ghazala, H. (2016). Automatic builder of class diagram (ABCD): an application of UML generation from functional requirements. Software: Practice and Experience, 46(11), 1443-1458. https://doi.org/10.1002/spe.2384

Bondinuba, F. K., Nimako, S. G., & Karley, N. K. (2013). Developing student housing quality scale in higher institutions of learning: a factor analysis approach. Urban Studies Research, 2013(1), 383109. https://doi.org/10.1155/2013/383109

Camburn, B., Dunlap, B., Gurjar, T., Hamon, C., Green, M., Jensen, D., ... & Wood, K. (2015). A systematic method for design prototyping. Journal of Mechanical Design, 137(8), 081102. https://doi.org/10.1115/1.4030331

Hsieh, J. C., Li, A. H., & Yang, C. C. (2013). Mobile, cloud, and big data computing: contributions, challenges, and new directions in telecardiology. International journal of environmental research and public health, 10(11), 6131-6153. https://doi.org/10.3390/ijerph10116131

Kocielnik, R., Xiao, L., Avrahami, D., & Hsieh, G. (2018). Reflection companion: a conversational system for engaging users in reflection on physical activity. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(2), 1-26. https://doi.org/10.1145/3214273

Kusumba, S. (2023). Achieving Financial Certainty: A Unified Ledger Integrity System for Automated, End-to-End Reconciliation. The Eastasouth Journal of Information System and Computer Science, 1(01), 132-143. https://doi.org/10.58812/esiscs.v1i01.842

Mahmud, A., & Fitriani, N. (2025). The Role of Financial Reconciliation in Improving the Accuracy of Monthly and Annual Financial Reports at CV X. International Journal Administration, Business & Organization, 6(2), 301-312. https://doi.org/10.61242/ijabo.25.561

Miller, D. (2021). The best practice of teach computer science students to use paper prototyping. International Journal of Technology Innovation and Management (IJTIM), 1(2), 42-63. https://doi.org/10.54489/ijtim.v1i2.17

Misnevs, B., & Demiray, U. (2017). The role of communication and meta-communication in software engineering with relation to human errors. Procedia Engineering, 178, 213-222. https://doi.org/10.1016/j.proeng.2017.01.100

Oke, A. E., Aigbavboa, C. O., & Raphiri, M. M. (2017). Students’ satisfaction with hostel accommodations in higher education institutions. Journal of Engineering, Design and Technology, 15(5), 652-666. https://doi.org/10.1108/JEDT-04-2017-0036

Pacheco-Velazquez, E., Rodes-Paragarino, V., Mayer, L. R., & Bester, A. (2023). How to create serious games? Proposal for a participatory methodology. International Journal of Serious Games, 10(4), 55-73. https://doi.org/10.17083/ijsg.v10i4.642

Putra, Y., Yuhandri, Y., & Sumijan, S. (2021). Meningkatkan Keamanan Web Menggunakan Algoritma Advanced Encryption Standard (AES) terhadap Seragan Cross Site Scripting. Jurnal Sistim Informasi dan Teknologi, 56-63. https://doi.org/10.37034/jsisfotek.v3i2.44

Ramakrishna, D., & Shaik, M. A. (2024). A comprehensive analysis of cryptographic algorithms: Evaluating security, efficiency, and future challenges. IEEE Access. https://doi.org/10.1109/ACCESS.2024.3518533

Sahal, A., Aini, F. N., Zaidir, Z., & Listiawan, I. (2025). Enhancing Web Security Using AES and Twofish Algorithms. International Journal of Informatics and Computation, 7(1), 1-8. https://doi.org/10.35842/ijicom.v7i1.98

Shakantu, W., & Simpeh, F. (2018). On-campus housing facilities: the perceptions of Ghanaian university students. Journal of Emerging Trends in Economics and Management Sciences, 9(6), 318-324.

Siagian, E. K., Mulyana, A., & Hartaman, A. (2020). Perancangan Sistem Informasi dan Pengelolaan Asrama Berbasis Web dan Aplikasi Android Information and Management System Design Asrama Putri Telkom University Web-Based And Android Application. eProceedings Appl. Sci, 6(2), 2432-2441.

Stone, M., Aravopoulou, E., Evans, G., Aldhaen, E., & Parnell, B. D. (2019). From information mismanagement to misinformation–the dark side of information management. The Bottom Line, 32(1), 47-70. https://doi.org/10.1108/BL-09-2018-0043

Sukiman, T. S. A., Sandy, C. L. M., Meiyanti, R., Rizal, R. A., & Anshari, S. F. (2026). Implementation Of AES Algorithm For Text Message Encryption And Decryption Process. Gameology and Multimedia Expert, 3(1), 25-30. https://doi.org/10.29103/game.v3i1.25923

Utile, T. (2024). Student Hostel Accomodation Challenge in Benue State University, Makurdi and The Public-Private Partnership Option. Brawijaya Journal of Social Science, 4(1), 11-28. https://doi.org/10.21776/ub.bjss.2024.004.01.2

Wen, K., & Fang, Y. (2021). Daily information management system for postgraduates to check in and out of the dormitory based on mobile edge computing. Mobile Information Systems, 2021(1), 5167395. https://doi.org/10.1155/2021/5167395

Wong, W. P., Tan, H. C., Tan, K. H., & Tseng, M. L. (2019). Human factors in information leakage: mitigation strategies for information sharing integrity. Industrial Management & Data Systems, 119(6), 1242-1267. https://doi.org/10.1108/IMDS-12-2018-0546

Published
2026-02-03
How to Cite
Sinaga, S. H., Kainde, Q. C., & Rorimpandey, G. C. (2026). Implementation of the Advanced Encryption Standard 128 Algorithm in the Web-Based Management Information System. Journal La Multiapp, 7(1), 61-74. https://doi.org/10.37899/journallamultiapp.v7i1.2622