Volume 1 , Issue 1 , PP: 25-40, 2022 | Cite this article as | XML | Html | PDF | Full Length Article
Samia Ahmed Elsayed abou Elwafa 1 * , Elsaeed Elsaeed Mohamed Abd El-razk 2 , Samir Aboul Fotouh Saleh 3 , Safaa M. Elatawy 4
Doi: https://doi.org/10.54216/IJAIET.010103
The current system inside Egyptian universities s relies on the minimum and traditional methods of securing data that do not keep pace with the current digital development. Therefore, the education sector needs to take advantage of the advantages of block chain technology in securing and encrypting data from the risks of hacking and leakage of records. Through the above, an electronic system for generating a data encryption key based on block chain technology and the AES algorithm has been proposed.
Blockchain technology, Encryption Algorithm, (AES) algorithm
[1] https://www.nap.edu/read/9601/chapter/7
[2] Columbus L. Gartner hype cycle for emerging technologies, 2016 Adds blockchain & machine learning for
firsttime[OL]. <http: // www. forbes. com/ sites /louiscolumbus /2016/08/21/ gartner- hype- cycleforemerging- technologies-2016-adds-blockchain
[3] T.J. Gopane, “Blockchain Technology and Smart Universities,” Proceedings of 4th International Conference
on the Internet Cyber Security and Information Systems
[4]DaemenJ,RijmenV.ThedesignofRijndael:AEStheadvancedencryptionstandard.SpringerScience&BusinessMed
ia;2013
[5]BouillaguetC,DerbezP,FouquePA.Automaticsearchofattacksonround reducedAESandapplications.In:AnnualCryptologyConference.Springer;2011.p.169–187. [6]FazackerleyS,McAvoySM,LawrenceR.GPUacceleratedAES CBCfordatabaseapplications.In:Proceedingsofthe27thAnnualACMSymposiumonAppliedComputing.ACM;2012. p.873–878 . [7] Chen, L., Lee, W. K., Chang, C. C., Choo, K. K. R., & Zhang, N. (2019). Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95, 420-429. [8] Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32-45. [9] Khan, P. W., & Byun, Y. (2020). A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things. Entropy, 22(2), 175. [10] (https://techterms.com/definition/blockchain) [11] (https://blockgeeks.com/guides/what-is-blockchain-technology) [12] F. Tschorsch and B. Scheuermann, “Bitcoin and Beyond: A Technical Survey onDecentralized Digital Currencies,” IEEE 18, No. 3, 2016, pp. 2084-2123 [13.14) (J-Chen, S., Wang, H. & Zhang, ).2018 [15] https://www.conicryptocash .com [16]. Alrahili & Aldahawi, Journal of Information Studies & Technology, Vol. 2020(1). Art 5 [17]. Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., & Roback, E. (2001). Report on the development of the Advanced Encryption Standard (AES). Journal of Research of the National Institute of Standards and Technology, 106(3), 511. [18] . Alex Biryukov; Orr Dunkelman; Nathan Keller; Dmitry Khovratovich; Adi Shamir (2009-08-19).