DESIGN OF A CRYPTOGRAPHIC SYSTEM USING AES ALGORITHM AND A COMBINATION OF BLAKE2B AND SHA-3 HASH FUNCTIONS TO SECURE STUDENT INFORMATION FILES STORED ON HARD DISK DRIVES


DESIGN OF A CRYPTOGRAPHIC SYSTEM USING AES ALGORITHM AND A COMBINATION OF BLAKE2B AND SHA-3 HASH FUNCTIONS TO SECURE STUDENT INFORMATION FILES STORED ON HARD DISK DRIVES

TABLE OF CONTENT

Title Page………………..i

Certification……………ii

Dedication………………iii

Acknowledgment……….iv

Table of content………vii

CHAPTER ONE

INTRODUCTION

1.1    Background of Study

1.2    Statement of the Problem

1.3    Aim and Objectives

1.4    Methodology

1.5    Significance of the Study

1.6    Scope of the Study

CHAPTER TWO

LITERATURE REVIEW

2.1    Introduction

2.2    Information

2.3    Information System

2.3.1    Types of Information System

2.3.2    Computer-Based Information System

2.3.3    Information system development

2.4    Student information system

2.5    Data security

2.5.1    Technologies employed in data security

2.5.2    Basic Principles of Information Security

2.6    Access Control

2.7    Cryptography

2.7.1    A Brief History of Cryptography

2.7.1.1 Classic cryptography

2.7.1.2 Modern Cryptography

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1    Introduction

3.2    System Architectural Design

3.3    The Use Case Diagram

3.4    File encryption/decryption activity

3.5    The Class diagram

3.7    Blake2b Algorithm

3.8    SHA-3

CHAPTER FOUR

SYSTEM IMPLEMENTATION

4.0    Introduction

4.1    System Implementation

4.2    Graphical User Interfaces

4.3    System requirements

4.3.1    Hardware requirements

4.3.2    Software requirements

CHAPTER FIVE

SUMMARY, CONCLUSION, AND RECOMMENDATION

5.0    Summary

5.1    Conclusion

5.2    Recommendation

REFERENCES

APPENDIX: SOURCE CODE

CHAPTER ONE

INTRODUCTION

1.1    Background of Study

This digital age is currently facing the problem of creating a balance between convenience and security. Security is the mechanism by which information and services are protected from unintended or unauthorised access, change or destruction (Gurpreet and Supriya, 2013), security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who undermine the privacy of organizations and individuals to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is a valuable and costly asset that must be presented, controlled and planned just like other valuable assets within an organization. This work is designed to provide a security mechanism using a computerized Data Encryption System to securely store student information files.

One of the techniques used to secure data stored in computerised devices is Cryptography, Cryptography is a process which is associated with scrambling plaintext (ordinary text or clear text) into cipher text (a process called encryption), then back again to plain text known as decryption (Rajan and Geeta, 2013). Cryptography is not only used to prevent the alteration and theft of data but can be used for authentication, for the purpose of this research work, cryptographic algorithms will be categorized based on the number of keys used for encryption and decryption, and further defined by their application and use. In all cases, the initial unencrypted data is referred to as plain text. Generally, there are three types of cryptographic techniques used to accomplish these goals. The first scheme is known as Secret Key Cryptography (SKC), it uses the same key for both encryption and decryption. Another technique is called Public Key Cryptography (PKC), it uses two separate keys, one of which is private and one of which is public. The public key is used to encrypt the message and the private key is used to decrypt the message. The third technique is the use of Hash Functions, it is a mathematical function that takes an arbitrary length of data as an input and produces a fixed size of an output (Mohammad and Imad, 2013).

There are other techniques used in hiding data like Stenography and Watermarking but in this research work, an enhanced Advanced Encryption Standard (AES) cryptographic technique is proposed for the security of student information files stored in hard disk drives and system users will be authenticated using two hash functions (Blake2b and SHA-3).The student information files that are to be encrypted are generated from a student information system, a student information system is a form of management information system that is used by education organizations to manage the data of their students. Information as we all know is processed data, according to (Shannon, Claude, 1949), information is any type of pattern that influences the formation or transformation of other patterns. Information security is a serious concern for these organizations such as universities which stores sensitive personal information, making them attractive targets for security breaches.

1.2    Statement of the Problem

The problem to be solved in this research work is known as data falsification and illegal access to information which is a major concern for all computer users including large organizations. data falsification is any forgery action on stored information in users’ systems. Information about students in any education establishment or organization which at this age uses a computerised-student information system needs to be properly stored and should be handled by the right authority.

    Therefore, this project seeks to address the challenges facing the security of student information stored on hard disk drives by encrypting them using an enhanced AES cryptographic algorithm, storing them in a database and making sure that it is only accessed by the authorised user by using a hashing technique.

1.3    Aim and Objectives

The aim of this research is to develop a Cryptographic System using AES algorithm and a combination of Blake2b and SHA-3 hash functions to secure student information files stored on hard disk drives. The objectives are to;

1.    Develop a secured system that performs file encryption functions using AES encryption algorithm, Blake2b and SHA-3.

2.    Implement a secured system that will hide student information from unauthorized users.

1.4    Methodology

The methods employed in this project work are;

1.    An enhanced AES algorithm for the encryption of files.

2.    A Blake2b and SHA-3 hash function for user authentication.

3.    An SQLite database to implement the backend of the system.

4.    Python programming language for the frontend of the system.

1.5    Significance of the Study

This research work will help secure student information files generated from a student information system and stored in hard disk drives of a computer system. It will also serve as a reference point for researches and it will equally aid students who are interested in cryptography.

1.6    Scope of the Study

This research work covers the use of AES algorithm to encrypt and decrypt files stored on hard disk drives with an authentication module using Blake2b and SHA-3 hash functions which will be limited to text files, PCs and does not require a server or a network.

.

DESIGN OF A CRYPTOGRAPHIC SYSTEM USING AES ALGORITHM AND A COMBINATION OF BLAKE2B AND SHA-3 HASH FUNCTIONS TO SECURE STUDENT INFORMATION FILES STORED ON HARD DISK DRIVES



TYPE IN YOUR TOPIC AND CLICK SEARCH.




TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "Exceptionally outstanding. Highly recommend for all who wish to have effective and excellent project defence. Easily Accessable, Affordable, Effective and effective."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I saw this website on facebook page and I did not even bother since I was in a hurry to complete my project. But I am totally amazed that when I visited the website and saw the topic I was looking for and I decided to give a try and now I have received it within an hour after ordering the material. Am grateful guys!"

    Hilary Yusuf, United States International University Africa, Nairobi, Kenya.
  • "Researchwap.com is a website I recommend to all student and researchers within and outside the country. The web owners are doing great job and I appreciate them for that. Once again, thank you very much "researchwap.com" and God bless you and your business! ."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Great User Experience, Nice flows and Superb functionalities.The app is indeed a great tech innovation for greasing the wheels of final year, research and other pedagogical related project works. A trial would definitely convince you."

    Lamilare Valentine, Kwame Nkrumah University, Kumasi, Ghana.
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing researchwap.com.