TABLE OF CONTENTTitle Page………………..iCertification……………iiDedication………………iiiAcknowledgment……….ivTable of content………viiCHAPTER ONEINTRODUCTION1.1    Background of Study1.2    Statement of the Problem1.3    Aim and Objectives1.4    Methodology1.5    Significance of the Study1.6    Scope of the Study

CHAPTER TWOLITERATURE REVIEW2.1    Introduction2.2    Information2.3    Information System2.3.1    Types of Information System2.3.2    Computer-Based Information System2.3.3    Information system development2.4    Student information system2.5    Data security2.5.1    Technologies employed in data security2.5.2    Basic Principles of Information Security2.6    Access Control2.7    Cryptography2.7.1    A Brief History of Cryptography2.7.1.1 Classic cryptography2.7.1.2 Modern Cryptography

CHAPTER THREESYSTEM ANALYSIS AND DESIGN3.1    Introduction3.2    System Architectural Design3.3    The Use Case Diagram3.4    File encryption/decryption activity3.5    The Class diagram3.7    Blake2b Algorithm3.8    SHA-3

CHAPTER FOURSYSTEM IMPLEMENTATION4.0    Introduction4.1    System Implementation4.2    Graphical User Interfaces4.3    System requirements4.3.1    Hardware requirements4.3.2    Software requirements

CHAPTER FIVESUMMARY, CONCLUSION, AND RECOMMENDATION5.0    Summary5.1    Conclusion5.2    RecommendationREFERENCESAPPENDIX: SOURCE CODECHAPTER ONEINTRODUCTION1.1    Background of StudyThis digital age is currently facing the problem of creating a balance between convenience and security. Security is the mechanism by which information and services are protected from unintended or unauthorised access, change or destruction (Gurpreet and Supriya, 2013), security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who undermine the privacy of organizations and individuals to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is a valuable and costly asset that must be presented, controlled and planned just like other valuable assets within an organization. This work is designed to provide a security mechanism using a computerized Data Encryption System to securely store student information files.One of the techniques used to secure data stored in computerised devices is Cryptography, Cryptography is a process which is associated with scrambling plaintext (ordinary text or clear text) into cipher text (a process called encryption), then back again to plain text known as decryption (Rajan and Geeta, 2013). Cryptography is not only used to prevent the alteration and theft of data but can be used for authentication, for the purpose of this research work, cryptographic algorithms will be categorized based on the number of keys used for encryption and decryption, and further defined by their application and use. In all cases, the initial unencrypted data is referred to as plain text. Generally, there are three types of cryptographic techniques used to accomplish these goals. The first scheme is known as Secret Key Cryptography (SKC), it uses the same key for both encryption and decryption. Another technique is called Public Key Cryptography (PKC), it uses two separate keys, one of which is private and one of which is public. The public key is used to encrypt the message and the private key is used to decrypt the message. The third technique is the use of Hash Functions, it is a mathematical function that takes an arbitrary length of data as an input and produces a fixed size of an output (Mohammad and Imad, 2013). There are other techniques used in hiding data like Stenography and Watermarking but in this research work, an enhanced Advanced Encryption Standard (AES) cryptographic technique is proposed for the security of student information files stored in hard disk drives and system users will be authenticated using two hash functions (Blake2b and SHA-3).The student information files that are to be encrypted are generated from a student information system, a student information system is a form of management information system that is used by education organizations to manage the data of their students. Information as we all know is processed data, according to (Shannon, Claude, 1949), information is any type of pattern that influences the formation or transformation of other patterns. Information security is a serious concern for these organizations such as universities which stores sensitive personal information, making them attractive targets for security breaches.

1.2    Statement of the ProblemThe problem to be solved in this research work is known as data falsification and illegal access to information which is a major concern for all computer users including large organizations. data falsification is any forgery action on stored information in users’ systems. Information about students in any education establishment or organization which at this age uses a computerised-student information system needs to be properly stored and should be handled by the right authority.    Therefore, this project seeks to address the challenges facing the security of student information stored on hard disk drives by encrypting them using an enhanced AES cryptographic algorithm, storing them in a database and making sure that it is only accessed by the authorised user by using a hashing technique.1.3    Aim and ObjectivesThe aim of this research is to develop a Cryptographic System using AES algorithm and a combination of Blake2b and SHA-3 hash functions to secure student information files stored on hard disk drives. The objectives are to;1.    Develop a secured system that performs file encryption functions using AES encryption algorithm, Blake2b and SHA-3.2.    Implement a secured system that will hide student information from unauthorized users.

1.4    MethodologyThe methods employed in this project work are;1.    An enhanced AES algorithm for the encryption of files.2.    A Blake2b and SHA-3 hash function for user authentication.3.    An SQLite database to implement the backend of the system.4.    Python programming language for the frontend of the system.1.5    Significance of the StudyThis research work will help secure student information files generated from a student information system and stored in hard disk drives of a computer system. It will also serve as a reference point for researches and it will equally aid students who are interested in cryptography.1.6    Scope of the StudyThis research work covers the use of AES algorithm to encrypt and decrypt files stored on hard disk drives with an authentication module using Blake2b and SHA-3 hash functions which will be limited to text files, PCs and does not require a server or a network.




Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • " is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing