Proposing an Encryption Algorithm based (original) (raw)

A Secured Approach on Data Security for Education System and Result Management

We declare that this thesis is our original work and has not been submitted in any form for another degree or diploma at any university or other institute of tertiary education. Information derived from the published and unpublished work of others has been acknowledged in the text and a list of references is given.

Implementation of an Improved Data Encryption Algorithm in a Web Based Learning System

Physics International

Problem statement: This study proffered solution to some identified data insecurity problems in software development by the use of Web-based learning system as a test bed and development of an hybrid crypto-biometric security system. Approach: A variant of data encryption algorithm tagged (XOR-RSA algorithm) is developed in order to encrypt the messages being sent between the learner and the facilitator. Results: A comparative analysis of performance of this algorithm was carried out using cryptographic algorithm metrics in order to establish its stronger performance above the existing algorithms. The result shows that the improved algorithm (XOR-RSA) performed better than prominent data encryption algorithms in the likes of RSA, SKIPJACK, DES1 and 3DES. Conclusion/Recommendations: This was eventually implemented in a web based learning system. The work provides a prototype for the development of secured Web-based learning infrastructure and its contextual framework, which foster indigenization of electronic learning technology which will adequately address the related challenges in the phenomenon of system security in terms of confidentiality and integrity of the system.

Privacy and Security in Online Examination Systems

A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privacy represents the ability to maintain a personal space such that there is certain user control on what and how much of personal information can be shared with others. Security describes the level of data integrity and protection the system offers. There are two main factors that affect the student's privacy and security in an OES: exam score and impartiality. The exam score is encrypted before being saved in the database and can only be accessed by the respective authorized student. Impartiality is accomplished by using the proposed cryptography scheme that encrypts the student's identification before sending the paper to the examiner for grading.

Afolabi A.O & Adagunodo E.R (2012): Implementation of an Improved Data Encryption Algorithm in a Web Based Learning System. Physics International, Vol 2, No 1,pp31-35 ISSN 1948-9803.Science Publications

This study is centered on proffered solution to some identified data insecurity problems in software development using Web-based learning system as a test bed, by development of an hybrid crypto-biometric security system. A variant of data encryption algorithm tagged (XOR-RSA algorithms) is developed and a comparative analysis of performance of this algorithm was carried out using cryptographic algorithm metrics.. The result shows that the improved algorithm performed better than prominent data encryption algorithms in the likes of RSA,SKIPJACK, DES1,and 3DES. This was eventually implemented in a web based learning system. The work provides a prototype for the development of secured Web-based learning infrastructure and its contextual framework, which foster indigenization of electronic learning technology which will adequately address the related challenges in the phenomenon of system security in terms of confidentiality and integrity of the system.

Privacy and Security in Online Examinati

A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privacy represents the ability to maintain a personal space such that there is certain user control on what and how much of personal information can be shared with others. Security describes the level of data integrity and protection the system offers. There are two main factors that affect the student's privacy and security in an OES: exam score and impartiality. The exam score is encrypted before being saved in the database and can only be accessed by the respective authorized student. Impartiality is accomplished by using the proposed cryptography scheme that encrypts the student's identification before sending the paper to the examiner for grading.

Improving Security Measures of E-Learning Database

E-learning is a platform that provides materials online with the objective of improving the users' teaching and learning experience. The main objective of this paper is to provide security to users' passwords within the E-learning Password Management System (EPMS) in order to protect the database from hackers. The protection process is done by implementing a symmetric encryption algorithm named International Data Encryption Algorithm (IDEA) on the passwords. The algorithm will be improved by modifying the size of the same secret key that is used in both the encryption and decryption operations of the data. The proposed algorithm is known as Double-Secure IDEA.

Secure Exam Storage Using RSA public key encryption

Research Square (Research Square), 2022

Performance, usability, and security are the focus of software systems development. Confidentiality, availability and integrity are the main goals of these systems security. One common software system that needs to be secured is exams, which is an assessment method to measure student performance in education. Sharing exams between faculty members is common task for moderation and review, but it exposed to Leakage. Exams Leakage will affect confidentiality and integrity of the exams. Loss of confidentiality will affect the reputation of the institute, where loss of integrity may have serious impact on the students' performance. It is a troublesome for faculties to guarantee exam electronic documents confidentiality. Therefore, it is required to have secure exam storage systems. Some solutions are central server-based systems, cloud-based systems, and block chain-based systems. The cloud-based system is secure and trusted, but data may corrupt without the knowledge of the cloud service provider. Bock chain is a better solution but requires more storage. In this paper, we proposed a key management method to secure exams storage using public key Cryptosystem; it uses an RSA algorithm to provide distinctive feature of data integrity, confidentiality and authentication. It can be used in centralised server-based system or cloudbased system. The proposed framework provides security without increase in encoding and decoding time and without increase in file size.

An Information Security Scheme for Cloud based Environment using 3DES Encryption Algorithm

Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. While Cloud services offer flexibility, scalability and economies of scale, there have been commensurate concerns about security. On the similar terms, we have chosen to make use of a combination of authentication technique and key exchange algorithm blended with an encryption algorithm. In this project, we have proposed to make use of 3DES algorithm which is a well-known symmetric cryptosystem and is widely used for secure data transmission, along with that we will blend it with Random Key Generator and Graphical Password to add an extra security measure. This proposed architecture of three way mechanism and the use of symmetric method of encryption make it tough for hackers to crack the security system, thereby protecting data stored in cloud. This Cipher Block Chaining system is to be secure for clients and server. The security architecture of the system is designed by using DES cipher block chaining, which eliminates the fraud that occurs today with stolen data. There is no danger of any data sent within the system being intercepted, and replaced. The system with encryption is acceptably secure, but that the level of encryption has to be stepped up, as computing power increases. Results in order to be secure the system the communication between modules is encrypted using symmetric key.

A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution

Novel Algorithms and Techniques in Telecommunications and Networking, 2009

This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes but is not limited to symmetric and public-key cryptography, authentication, key management, and digital signatures. The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively. In other words, it is self sufficient in terms of the data that it stores.

Securing Sensitive Digital Data in Educational Institutions using Encryption Technology

Recently, modern technologies have made a positive contribution to most institutions of the society. However, they have generated serious issues with regard to the data security. For example, in the educational sector, most educational institutions have huge amounts of various types of data, which require rigorous protection ways to ensure their security and integrity. This study aims at reviewing the most recent data security methods, particularly the existing common encryption algorithms as well as designing an electronic system based on efficient and trusted ones to protect academic and nonacademic digital data in educational institutions. The study applies the satisfaction questionnaire as instrument to evaluate the proposed system efficiency. The questionnaire has been presented to the evaluation team whose members are divided into two groups: experts and end users. The results of the evaluation process have indicated that, the satisfaction ratio of the proposed system is encouraging. The overall satisfaction percentage is 96.25%, which demonstrates that the proposed system is an acceptable and suitable choice for various security applications.