Development of a Cryptography Secured E-Administration System

Authors

  • Ohwobeno, Omohwo Department of Computer Science, Delta State University, Asaba, Delta State, Nigeria
  • Iwasokun, Gabriel Babatunde Department of Software Engineering, Federal University of Technology, Akure, Nigeria
  • Adegoke, Michael Abejide Department of Computer Science, Bells University of Technology, Ota, Nigeria
  • Agbelusi, Olutola Department of Software Engineering, Federal University of Technology, Akure, Nigeria
  • David, Bamidele Department of Software Engineering, Federal University of Technology, Akure, Nigeria
  • Ibraheem, Temitope Department of Software Engineering, Federal University of Technology, Akure, Nigeria

DOI:

https://doi.org/10.14738/aivp.124.17025

Keywords:

E-administration, cryptography, management system, encryption, decryption

Abstract

This paper presents the design of the e-administration platform that adopts the concept of cryptography for identity management. The architectural framework of the platform comprises subcomponents for service and forms identification, business process redesign, service architecture, amalgamation, and deployment. The cryptography model for securing the platform was designed based on the combination of authentication criteria presented in the Rijndael-Advanced Encryption Standard (AES), Lattice-based cryptography (LBC), and Secure Hash Algorithm (SHA512). It is required that a record be encrypted prior to its commitment to the database via a double encryption method. The AES algorithm-based encryption’s output formed the input to the LBC algorithm to obtain the final output. Five text files of varying sizes were used to evaluate the performance of the AES, GGH, and the Hybrid Encryption Algorithm (HEA). The evaluation of the algorithms focused on three key parameters; namely encryption time, decryption time, and the size of the encrypted file. Results showed that the time taken by the HEA encryption algorithm encryption and decryption processes is significantly higher compared to the time taken by the AES and GGH algorithms. This suggests that the HEA takes longer times and hence will be more difficult for intruders to manipulate or read.

Downloads

Published

2024-08-19

How to Cite

Ohwobeno, O., Iwasokun, G. B., Adegoke, M. A., Agbelusi, O., David, B., & Ibraheem, T. (2024). Development of a Cryptography Secured E-Administration System. European Journal of Applied Sciences, 12(4), 327–352. https://doi.org/10.14738/aivp.124.17025

Most read articles by the same author(s)