428 247
Full Length Article
Volume 4 , Issue 1, PP: 26-35 , 2021


A Web Based Document Encryption Application Software for Information Security in Tertiary Institutions

Authors Names :   Ibeneme-Sabinus Ifeoma Livina   1 *     Ekedebe Nnanna   2     Nwokonkwo Obi   3     Ibeneme Sabinus Ikechukwu   4     Ajah Benjamin Ogonnaya   5     Amadi Emmanuel Chukwudi   6  

1  Affiliation :  Graduate Assistant, Department of Cybersecurity, School of Information and Communication Technology (SICT), Federal University of Technology, Owerri

    Email :  peseesabim@gmail.com and ifeoma.ibeneme-sabinus@futo.edu.ng

2  Affiliation :  Lecturer II, Department of Information Technology, School of Information and Communication Technology (SICT), Federal University of Technology Owerri, Nigeria

    Email :  ekedebe.nnanna@futo.edu.ng

3  Affiliation :  Senior Lecturer, Department of Information Technology, School of Information and Communication Technology (SICT), Federal University of Technology Owerri, Nigeria

    Email :  obiokonwo@futo.edu.ng

4  Affiliation :  Senior Lecturer, Department of Geology, School of Physical Sciences (SOPS), Federal University of Technology Owerri, Nigeria

    Email :  sabinusibeneme@futo.edu.ng

5  Affiliation :  Technologist, Department of Computer Science, Faculty of Natural and Applied Sciences (FNAS), Federal Polytechnic Nekede Owerri, Nigeria

    Email :  ogonnaya.ajah@fedponek.edu.ng

6  Affiliation :  Lecturer I, Department of Information Technology, School of Information and Communication Technology (SICT), Federal University of Technology Owerri, Nigeria

    Email :  emmanuel.amadi@futo.edu.ng

Doi   :  10.5281/zenodo.3909971

Received: Feb 27, 2020 Revised: May 21, 2020 Accepted: April 24, 2020

Abstract :

A web based user friendly document encryption application software was developed as a better cryptographic online system used in securing important tertiary institutions’ documents such as students' Official Grade Report (OGR) sheets, computed and approved results, transcripts, examination and test question papers, Senate/Council documents and any other sensitive or important document needed to be secured from unauthorized users. It is a known fact that problems like unsecured information, information misuse, tampering of sensitive documents by unauthorized persons, stress of hiding sensitive documents from unauthorized persons and locating hidden sensitive documents exist in any system/unit where proper data security mechanism is not in place. In this research work, an online cryptographic system was designed, using Advanced Encryption Standard (AES) algorithm, to secure important documents. The Analysis and Design of this system followed the Structured System Analysis and Design Methodology (SSADM) using web tools. The output of the software shows that the application can encrypt files and save in the database and can only be decrypted using a cipher key automatically generated by the system. With this software, sensitive information can be easily accessed without stress or fear and it has created a more reliable and safer platform to secure such sensitive documents other than the primitive method of using username and password.

Keywords :

Cipher key , Cryptography , Data , Encryption , Information , Tertiary Institution

References :

[1] Liddell Henry George, Scott Robert, Jones Henry Stuart, McKenzie Roderick (1984). A Greek-English Lexicon. Oxford University Press. page 827.

 [2] Agrawal, Monika (2012). A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering. 4: pages 877–882. CiteSeerX

 [3] Jasim, O., Abbas, S., Horbaty, E. and Salem, A. (2015) Evolution of an Emerging Symmetric Quantum   Cryptographic Algorithm. Journal of Information Security, 6: pages 82-91. doi: 10.4236/jis.2015.62009.

[4] Rohan Rayarikar, Sanket Upadhyay, Priyanka Pimpale, (2012). SMS Encryption using AES    Algorithm on Android, IJCA, Volume 50- No.19, pages 12-17.

 [5] Kirti Prakash Choudhury, Sangeeta Kakoty (2017). Comparative Analysis of Different Modified Advanced Encryption Standard Algorithms Over Conventional Advanced Encryption            Standard Algorithm. International Journal of Current Research and Review vol. 9, issue 22: pages 31-34.

[6] Isaac Kofi Nti, Eric Gymfi and Owusu Nyarko (2017), Implementation of Advanced Encryption Standard Algorithm with KeyLength of 256 Bits for Preventing Data Loss in an Organization, Department of Electrical/Electronic Engineering, Sunyani Technical University, Ghana. International Journal of Science and Engineering Application, vol. 6    issue 03: pages 87-101.

 [7] Kshyamasagar Mahanta, Hima Bindu Maringanti (2015). An Enhanced Advanced Encryption Standard Algorithm. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), Vol. 4 , No.4: pages 28 - 33.

 [8] Vinodh Gopal, Jim Guilford, and Wajdi Feghali (2015). Application of Classical Encryption Techniques for Securing Data-A Threaded Approach. International Journal on Cybernetics and Informatics. vol.4, No.2: pages 125-132.

 [9] Umalaxmi Sawant, Kishor Wane (2016).  Analysis of the Effective Advanced Encryption Standard Algorithm. International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 3: pages 965-967.

[10] Luka Daoud, Fady Hussein, and Nader Rafla (2019). Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS). EPiC Series in Computing Volume 58: pages 36-44

[11] Vignesh (2020). Incremental Research on Cyber Security Metrics in Android Applications by Implementing the ML Algorithms in Malware Classification and Detection. Journal of Cybersecurity and Information Management (JCIM) Vol. 3, No. 1, pages 14-20.

[12] Karthikeyan S, Sairamn, Manikandan G,and Sivaguru J. (2012). The Use of Parallel Processing Enhances the Speed of System when Compared to the Traditional Crypto Systems. International Journal on Cybernetics & Information (IJCI) Vol. 4, No. 2: page 127.

[13] Gadicha (2020). Implicit Authentication Approach by Generating Strong Password through Visual Key Cryptography Journal of Cybersecurity and Information Management (JCIM) Vol. 1, No. 1, pages. 5-16.