Uploaded by Roland Nwaosah

SEMINAR

advertisement
CHAPTER ONE
1.0
INTRODUCTION
Entrepreneurship is an employment strategy that can lead to economic self-sufficiency for
people who are unemployed. Self-employment provides people and their families with the
potential to create wealth and manage businesses in which they function as the employer or
boss, rather than merely being an employee. Oftentimes, people who are unemployed are
eligible and receive supplemental supports (technical and financial) which can serve as a
safety net that may decrease the risk involved with pursuing self-employment opportunities.
Youth who want to become entrepreneurs rarely receive information on pursuing it as a
career option. Entrepreneurship offers a solution. It seeks to prepare people, particularly
youth, to be responsible, enterprising individuals who become entrepreneurs or
entrepreneurial thinkers by immersing them in real life learning experiences where they can
take risks, manage the results, and learn from the outcomes.
1.1
AIM AND OBJECTIVES
The aim of this paper is to develop a student’s data encryption system software using
advanced encryption system algorithm, while the objectives are listed below:

Manage large number of student details.

Protect all results of students who registered for the course and send appropriate details about the result
to the students account.

Create student accounts and maintain the data’s effectively.
1

View all the details of the students.

Activities like updating, modification, deletion of records should be easier.
1.2
SCOPE OF THE STUDY
This work is confined to South-western University, Ogun state that is our area of
research work. This was done to attain a standard output that will be useful to both
students and as well as the staff of college. It also helps in making a quick, accurate,
efficient and reliable data processing.
1.3
PURPOSE OF THE STUDY
The original purpose of this study is to design and implement student’s data encryption
system for Southwestern University, Ogun state. Its purpose is to have the following:
(i)
Efficient and safe storage
(ii)
Quick retrieval of records and information
(iii)
Proper accounting and file keeping
(iv)
Quick response to any adhoc enquires
(v)
Assist in result recording
2
CHAPTER TWO
2.0
LITERATURE REVIEW
2.1
Application of Advanced Encryption System
A large and growing body of literature has investigated the application of AES for data
security. These applications include video encryption (Xue-liang et al., 2010), image
encryption (Huang et al., 2010, Chaouch et al.,2016), SMS encryption (Ariffi et al., 2013),
microcontroller based applications (Nasser et al., 2016). AES algorithm has found its use in
banking, healthcare, military and internet servers (Huang et al., 2010). Our choice of AES
algorithm over other encryption algorithm like Data Encryption Standard (DES) is informed
on its resilience to several type of attacks like square, impossible differential, subtotal,
boomerang, rectangle, related key rectangle and collision attack (Hu, 2011). An interesting
feature of AES algorithm is its low overhead cost of processing making it operable on small
3
computing devices (Nasser et al., 2016, Saicheur and Piromsopa, 2017, Yu and Köse, 2017),
hence in our application, AES does not compromise the memory allocation of the operating
system.
2.2
Structure of Advanced Encryption System
The AES algorithm is a round-based (16 x 16 matrix) symmetric block that processes data
block of 128 bits using a variable length cipher key (Guo et al., 2015). The key length are of
128, 192, 256 bits. There are three layers of operation that act on the 128 bit block to achieve
the required encryption. They are Add round, Byte substitution and diffusion layer.
2.2.1 Add Round Layer
This layer executes an XOR operation on round key and state on each iteration loop. This
operation develops a link between the cipher-text and the key to satisfy the confusion
principle(Guo et al., 2015).
2.2.2 Byte Substitution Layer
To achieve more security, this layer reflects the diffusion-confusion Shannon’s principles for
cryptographic algorithm design by performing a nonlinear byte substitution using a substation
table which operates independently on each byte (Huang et al., 2010).
2.2.3 Diffusion Layer
4
In this layer, multiple transformation operations are performed on each state to ensure high
degree diffusion. The operations are row shifting and column mixing. The row shift operation
is a circular shifting of the row of the state to the left with different offset bytes. The column
mixing operation is non linear transformation obtained by multiplying each column of the
state with a fixed polynomial. (Guo et al., 2015, Huang et al., 2010).
The encoding and decoding algorithm of AES is shown in figure 1. From the flow, both the
plain text and cipher text are 128 bit data while the decryption process is an inverse of the
encryption operation.
PLAIN TEXT
CIPHER TEXT
ALL ROUND KEY
ALL ROUND KEY
ROUND 1
INV SHIFT ROWS
SUB-BYTES
ROUND 1-9
SHIFT ROW
INV-SUB BYTES
MIX COLUMN
ADD ROUND KEY
ADD ROUND KEY
INV MIXED COLUMS
SUB-BYTES
INV SHIFT-ROWS
ROUND 10
SHIFT ROWS
INV SUB-BYTES
ALL ROUND KEY
ALL ROUND KEY
CIPHER TEXT
Y= AES(x)
5
PLAIN TEXT
Y= AES(x)
ROUND 2-10
Figure 1: AES Encryption and Decryption Algorithm
CHAPTER THREE
3.0
SYSTEM METHODOLOGY AND DESIGN
According to Oxford Advanced Learners Dictionary, a system is a group of things or parts
that are connected to work together as a whole. In fundamentals of computing, a system is
being defined as a set of interrelated components working together for something or to
achieve specific task or goals. Various methods are used in carrying out a research and in
collecting data which are completely based on reliability, suitability of the desired system.
The system has been designed to be user friendly, it is therefore essential that users should be
aware of the system requirement model for optimum system performance. A system is an
orderly grouping of interdependent components linked together according to a plan to achieve
a specific purpose or objectives. System development can generally be thought having two
6
major components: System analysis and System design. In system analysis more emphasis is
given to understanding the details of an existing system especially on the traditional way of
teaching techniques by teachers or a proposed one such as the use of ICT and then deciding
whether the proposed system is desirable or not and whether the existing systems needs
improvements. Thus, system analysis is the process of investigating a system, identifying
problems and using the information to recommend improvements to the system. System
analysis can also be defined as the method of determining how best to use a computer with
other resources to perform task, which meets the information needs of an organization or
individual.
3.1 .METHODOLOGY
Methodology is a set of procedures to follow to accomplish a set of goals within a particular
domain. Research methodology describes the approach used in the design of the intended
system. It is the adoption or modification of any of the approaches discovered in the
literature. It describes every step in the project life cycle in depth, so you know exactly which
tasks to complete, when and how. Whether you're an expert or a novice, it helps you
complete tasks faster than before. A project methodology is a structured method for effective
project construction and management. A project methodology tells you what you have to do,
to manage your projects from start to finish.
3.1.1 Advance Encryption System Implementation on student’s data
7
In this section, the encryption template used for the design of the system is explained, the
user interface that allows for record update is shown and software tools required for the
design of the system shown.
3.1.1.1
Encryption/Decryption Template
The method adopted the current data representation style of the examination and record unit
to develop cipher flowchart of figure 2 as the basis of its design.
Collation of Result
Input of Record
Encrypt
Display Real Record
Decrypt
Edit
Delete Record
Save Record
Generate Report
8
Figure 2: Design Flow Chart
In this design, results are collated according to their unique properties and encrypted
individually. Hence each form format has a possibility of operating with different key,
making a database most necessary for the records. The most complicated layer of the AES
algorithm implementation is the diffusion layer involving column mixing which requires a
polynomial multiplication (3x3+x2+x+2) and modulo (x4+1) on finite field GF(28). This is
achieved by configuring the encryption template to suite our encryption requirement. Hence
each field forms a unique state requiring a specific key. Other requirement of the algorithm
setup is achieved through configuration of the encryption template provided by visual studio
interface to produce an output report of figure 3
Figure 3: Output report
3.1.1.2. User Interface
The user interface is designed to allow modular update of the database with unique student
record as shown in figure 4.
9
Figure 4: User interface for record update
Records are encrypted after all the entry fields have been updated with their current values to
produce the report as shown in figure 3.
10
CHAPTER FOUR
4.0
RESULT AND ANALYSIS
In this section, we will demonstrate a prototype of the student data encryption system
showing the program process, testing and result
4.0.1 Entry Point
11
Figure 5: Entry Point
The entry point allows an authenticated user to log into the system. In this approach only
authenticated staff of examination and record unit will have the privilege of accessing student
data. This method permits for file level authentication. Hence other users could use the same
system for other administrative responsibilities but only authenticated user can access student
record.
4.0.2. Record Update
The procedure involves creation, update and management of student record. The interface of
figure 4 allows for new entries to be made or an update provided for existing entries. The exit
of this interface ensures that the data is saved into the database.
4.0.3. Encryption and Decryption
12
At exit point, the records are encrypted for the entries entered, making provision for new
entries to be entered.
Figure 6: Decryption
Although a single key is used for the encryption and decryption, each field is encrypted
before new entries are made. Figure 6 shows a request for authentication key, with the correct
key, the field entries will be decrypted, showing the information content. This result is shown
in figure 7.
13
Figure 7: Result
4.0.4 User Analysis
A total of 61 active students’ record were entered into the system and processed successfully.
During the testing of the system, three different groups of people where used to test the
acceptability of the system after a little orientation of the application operational procedure.
They include low computer knowledge users, medium and experts. When compared with
other common applications, it was discovered that low computer proficiency user requires
much assistance to use the application effectively while medium and expert users requires
little or no assistance to use the application effectively.
14
4.0.5 System Requirement
The application was developed using Microsoft visual studio with .Net framework of V4.0
and Microsoft access interface for database management. The application will successfully
execute in a system running windows 7 and above operating system, Minimum of 512MB
Random Access Memory (RAM) size and 80GB hard drive capacity.
15
CHAPTER FIVE
5.0
SUMMARY, RECOMMENDATION AND CONCLUSION
5.1
SUMMARY
The seminar paper has demonstrated a prototype design of student record encryption system
using AES algorithm. The designed was tested and executed successfully for 61 students
which represent a class capacity. Although the application has the capacity of handling the
whole school record, usage of the application requires at least medium level of computer
proficiency to effectively utilize the system objective optimally.
5.2
RECOMMENDATION
It is recommended that future research in this work should incorporate networked encryption
algorithm. More work is anticipated in the future to make the application easily accessible by
low level computer proficiency users while not compromising the security reliability.
5.3
CONCLUSION
The current student data template obtainable at examination and record unit of Southwestern
University was used as entry point for the design of the application. The developed system
operates effectively at standalone architecture and if implemented will serve the institution,
also protect students data for future purposes.
16
REFERENCES

ARIFFI, S., MAHMOD, R., RAHMAT, R. & IDRIS, N. A. SMS Encryption Using
3D-AES Block Cipher
on Android Message Application. 2013 International
Conference on Advanced Computer Science Applications and Technologies, 23-24
Dec. 2013 2013. 310- 314.

CHAOUCH, A., BOUALLEGUE, B. & BOURAOUI, O. Software application for
simulation-based AES, RSA and elliptic-curve algorithms. 2016 2nd International
Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2123 March 2016 2016. 77-82.

GUO, G. L., QIAN, Q. & ZHANG, R. Different Implementations of AES
Cryptographic Algorithm. 2015 IEEE 17th International Conference on High
Performance Computing and Communications, 2015 IEEE 7th International
Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International
Conference on Embedded Software and Systems, 24-26 Aug. 2015 2015. 1848-1853.

HU, Z. Progress in the Advanced Encryption Standard. 2011 International Conference
on Intelligence Science and Information Engineering, 20-21 Aug. 2011 2011. 345348.

HUANG, C. W., CHE-HAO, C., CHIEN-LUN, Y., YICHENG, C., KUO-HUANG,
C. & CHI-JENG, C. The AES application in image using different operation modes.
17
2010 5th IEEE Conference on Industrial Electronics and Applications, 15-17 June
2010 2010. 393-398.

NASSER, Y. A., BAZZOUN, M. A. & ABDUL-NABI, S. AES algorithm
implementation for a simple low cost portable 8-bit microcontroller. 2016 Sixth
International Conference on Digital Information Processing and Communications
(ICDIPC), 21-23 April 2016 2016. 203-207.

SAICHEUR, V. & PIROMSOPA, K. An implementation of AES-128 and AES-512
on Apple mobile processor. 2017 14th International Conference on Electrical
Engineering/Electronics,
Computer,
Telecommunications
and
Information
Technology (ECTI-CON), 27-30 June 2017 2017. 389-392.

XUE-LIANG, W., FU-HAI, X. & DA-YONG, W. Application of AES algorithm in
digital cinema projection system based on DaVinci technology. 2010 International
Conference on Information, Networking and Automation (ICINA), 18-19 Oct. 2010
2010. V2-24-V2-27.

YU, W. & KÖSE, S. 2017. A Lightweight Masked AES Implementation for Securing
IoT Against CPA Attacks. IEEE Transactions on Circuits and Systems I: Regular
Papers, 64, 2934- 2944.
18
Download