FIELD LEVEL ENCRYPTION IMPLEMENTATION USING AES-256 FOR SECURE ACADEMIC INFORMATION SYSTEMS
Abstract
Data protection in higher education remains a pressing concern as student records and program registration data are frequent targets of cyber incidents. This paper presents the design and implementation of AES-256 to secure the registration feature within an academic information system (AIS). Specifically, this study delivers three main contributions: a modular cryptographic implementation at the controller level, a granular field-level encryption policy for sensitive attributes, and a validated security mechanism. We integrated a cryptographic module into a Fastify (Node.js) backend and PostgreSQL datastore. The results demonstrate the fulfillment of these contributions: first, the modular implementation effectively isolates encryption logic from the database layer; second, the field-level policy successfully secures sensitive PII while maintaining 100% query efficiency for non-sensitive data; and third, the security mechanism was validated through 17 white-box scenarios and dual-layer API testing. These results confirmed 100% functional correctness in encryption/decryption cycles and robust handling of invalid data inputs. The study contributes a practically deployable pattern for field level encryption in university information systems.
References
J. Li, W. Xiao, and C. Zhang, “Data security crisis in universities: identification of key factors affecting data breach incidents,” Humanit Soc Sci Commun, vol. 10, no. 1, p. 270, May 2023, doi: 10.1057/s41599-023-01757-0.
M. Reza, A. F. Cobantoro, and I. A. Zulkarnain, “HARDENING SERVER MENGGUNAKAN METODE PORT KNOCKING PADA SISTEM PROGRAM STUDI TEKNIK INFORMATIKA UNIVERSITAS MUHAMMADIYAH PONOROGO,” Jurnal Ilmiah Informatika Komputer, vol. 29, no. 3, pp. 298–315, Dec. 2024, doi: 10.35760/ik.2024.v29i3.12954.
E. Bonnie, “110 of the Latest Data Breach Statistics [Updated 2024],” SecureFrame.
P. D. SULISTYO, “Atasi Kebocoran Data, BPJS Kesehatan Libatkan Kementerian Pertahanan,” Kompas.com, May 21, 2021.
E. P. Nimasari, A. F. Cobantoro, S. D. Andika, and Moh. B. Setyawan, “Analisis Implementasi Teknologi Pembelajaran di Bebas UMPO,” Jurnal Ilmiah Edutic : Pendidikan dan Informatika, vol. 9, no. 2, pp. 162–177, Jun. 2023, doi: 10.21107/edutic.v9i2.19938.
D. Sam et al., “Survey of risks and threats in online learning applications,” in Secure Data Management for Online Learning Applications, Boca Raton: CRC Press, 2023, pp. 31–47. doi: 10.1201/9781003264538-2.
A. R. Okoro and G. U. Cantafio, “Cybersecurity Crisis Management in Higher Education Institutions,” 2023, pp. 26–48. doi: 10.4018/978-1-6684-8332-9.ch002.
M. A. N. Acosta and H. Jahankhani, “An Empirical Study into Ransomware Campaigns Against the Education Sector and Adopting the Cybersecurity Maturity Model Certification Framework,” 2023, pp. 67–103. doi: 10.1007/978-3-031-33627-0_4.
H. S. Lallie, A. Thompson, E. Titis, and P. Stephens, “Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector,” Computers, vol. 14, no. 2, p. 49, Feb. 2025, doi: 10.3390/computers14020049.
E. R. G, S. M, A. D, V. A, J. Titus, and P. S, “AES+: A Modified AES Encryption with Enhanced Key Management and Distribution,” in 2023 6th International Conference on Recent Trends in Advance Computing (ICRTAC), 2023, pp. 330–335. doi: 10.1109/ICRTAC59277.2023.10480804.
T. Monica, A. I. Hadiana, and M. Melina, “Question Bank Security Using Rivest Shamir Adleman Algorithm and Advance Encryption Standard,” JIKO (Jurnal Informatika dan Komputer), vol. 7, no. 3, pp. 175–181, Nov. 2024, doi: 10.33387/jiko.v7i3.8654.
O. Parulekar, S. Desai, A. Raut, and M. A. Gangarde, “Cryptography Using AES Algorithm,” in 2024 Intelligent Systems and Machine Learning Conference (ISML), IEEE, May 2024, pp. 751–760. doi: 10.1109/ISML60050.2024.11007299.
T. Monica, A. I. Hadiana, and M. Melina, “QUESTION BANK SECURITY USING RIVEST SHAMIR ADLEMAN ALGORITHM AND ADVANCED ENCRYPTION STANDARD,” JIKO (Jurnal Informatika dan Komputer), vol. 7, no. 3, pp. 175–181, Nov. 2024, doi: 10.33387/jiko.v7i3.8654.
D. S. Jat and I. S. Gill, “Enhanced Advanced Encryption Standard with Randomised Round Keys,” in 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), IEEE, Jul. 2020, pp. 381–386. doi: 10.1109/WorldS450073.2020.9210327.
E. P. Nimasari, B. Harmanto, R. Bonavidi, A. F. Cobantoro, C. Elvina Dwi, and R. Velrinda Fahza’a, “Engaging students in a collaborative and reflective reading material development,” JEES (Journal of English Educators Society), vol. 10, no. 2, pp. 106–117, Oct. 2025, doi: 10.21070/jees.v10i2.1948.
M. Zuber and P. Ramakrishna, “Rejuvenating Orphans through Educational Supports,” in Education of Socio-Economic Disadvantaged Groups, London: Routledge India, 2023, pp. 240–251. doi: 10.4324/9781003370222-22.
W. Riddle et al., “AESPIE: Raspberry Pi AES Performance Evaluation Using Image Encryption in C and Python,” 2023, pp. 257–265. doi: 10.1007/978-3-031-40447-4_30.
J. S. Revathy, M. S. Prakash, K. Lingeshwaran, J. D. Dhinakaran, and V. Harish, “A Comprehensive Study of the Advanced Encryption Standard (AES) for Secure Communications,” in 2025 3rd IEEE International Conference on Industrial Electronics: Developments & Applications (ICIDeA), IEEE, Feb. 2025, pp. 1–6. doi: 10.1109/ICIDeA64800.2025.10963018.
S. A. Basha and A. Khan, “Image Thresholding Using Discrete Wavelet Transform with Retention of Possible Edge Contour,” Palestine Journal of Mathematics, vol. 12, no. 3, pp. 224 – 230, 2023, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85177833255&partnerID=40&md5=02a403e22bd0e6ec3de5fdb95d7b02fa
A. C. Reddy, G. Varun, S. Rossan, and B. M, “PrivCloud: Data Anonymization Service for Secure Cloud Environments,” in 2025 6th International Conference for Emerging Technology (INCET), IEEE, May 2025, pp. 1–5. doi: 10.1109/INCET64471.2025.11140353.
K. J. Lakshmi and G. Sreenivasulu, “Enhance Speed Low Area FPGA Design Using S-Box GF and Pipeline Approach on Logic for AES,” Mathematical Modelling of Engineering Problems, vol. 11, no. 3, pp. 773–782, Mar. 2024, doi: 10.18280/mmep.110322.
M. Haka, A. Haka, V. Aleksieva, and H. Valchanov, “Study of Encryption Time with the use of AES 128-, 192- and 256-Bit Keys,” in 2025 19th Conference on Electrical Machines, Drives and Power Systems (ELMA), IEEE, Jun. 2025, pp. 1–4. doi: 10.1109/ELMA65795.2025.11083503.
A. B, M. K. H.S, and V. C M, “Advanced Encryption Standard (AES) Implementation in FPGA,” in 2025 International Conference on Sensors and Related Networks (SENNET) Special Focus on Digital Healthcare(64220), IEEE, Jul. 2025, pp. 1–6. doi: 10.1109/SENNET64220.2025.11135984.
A. Bariant, J. Baudrin, G. Leurent, C. Pernot, L. Perrin, and T. Peyrin, “Fast AES-Based Universal Hash Functions and MACs: Featuring LeMac and Macs,” IACR Transactions on Symmetric Cryptology, vol. 2024, no. 2, pp. 35–67, Jun. 2024, doi: 10.46586/tosc.v2024.i2.35-67.
N. Aleisa, “A comparison of the 3DES and AES encryption standards,” International Journal of Security and its Applications, vol. 9, no. 7, pp. 241–246, 2015, doi: 10.14257/ijsia.2015.9.7.21.
S. Choi, D. Kim, and S. C. Seo, “Parallel Implementation of Scrypt: A Study on GPU Acceleration for Password-Based Key Derivation Function,” Journal of information and communication convergence engineering, vol. 22, no. 2, pp. 98–108, Jun. 2024, doi: 10.56977/jicce.2024.22.2.98.
Y. Qiu et al., “Accelerating Authenticated Block Ciphers via RISC-V Custom Cryptography Instructions,” in 2025 Design, Automation & Test in Europe Conference (DATE), IEEE, Mar. 2025, pp. 1–7. doi: 10.23919/DATE64628.2025.10992864.
C. Mancillas-López and B. Ovilla-Martínez, “An Ultra-Fast Authenticated Encryption Scheme with Associated Data Using AES-OTR,” Journal of Circuits, Systems and Computers, vol. 31, no. 09, Jun. 2022, doi: 10.1142/S0218126622501675.
M. K. B C, A. K. R J, S. D, and P. S. M, “Data Encryption and Decryption Using DNA and Embedded Technology,” in 2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), IEEE, Dec. 2022, pp. 1–5. doi: 10.1109/ICERECT56837.2022.10060708.
Y. Genc and E. Afacan, “Implementation of New Message Encryption using Elliptic Curve Cryptography Over Finite Fields,” in 2021 International Congress of Advanced Technology and Engineering (ICOTEN), IEEE, Jul. 2021, pp. 1–6. doi: 10.1109/ICOTEN52080.2021.9493519.
Z. Wu, K. Zhang, Y. Ren, J. Li, J. Sun, and W. Wan, “Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images,” Security and Communication Networks, vol. 2021, pp. 1–16, Jan. 2021, doi: 10.1155/2021/6675354.
V. Yesin, M. Karpinski, M. Yesina, V. Vilihura, R. Kozak, and R. Shevchuk, “Technique for Searching Data in a Cryptographically Protected SQL Database,” Applied Sciences, vol. 13, no. 20, p. 11525, Oct. 2023, doi: 10.3390/app132011525.
P. Antonopoulos et al., “Azure SQL Database Always Encrypted,” in Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, New York, NY, USA: ACM, Jun. 2020, pp. 1511–1525. doi: 10.1145/3318464.3386141.
D. Costa, M. Teixeira, A. N. Pinto, and J. Santos, “High-performance blockchain system for fast certification of manufacturing data,” SN Appl Sci, vol. 4, no. 1, p. 25, Jan. 2022, doi: 10.1007/s42452-021-04909-6.
V. Casola, A. De Benedictis, C. Mazzocca, and V. Orbinato, “Secure software development and testing: A model-based methodology,” Comput Secur, vol. 137, p. 103639, Feb. 2024, doi: 10.1016/j.cose.2023.103639.
L. Leonardi, G. Lettieri, P. Perazzo, and S. Saponara, “On the Hardware–Software Integration in Cryptographic Accelerators for Industrial IoT,” Applied Sciences, vol. 12, no. 19, p. 9948, Oct. 2022, doi: 10.3390/app12199948.
DOI: https://doi.org/10.33387/jiko.v9i1.10884
Refbacks
- There are currently no refbacks.



