SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Research
Available at https://edupediapublications.org/journals
e-ISSN: 2348-6848
p-ISSN: 2348-795X
Volume 05 Issue 16
June 2018
Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 382
Usability of Developed Multiple file Encryption using
Rijndael Algorithm
Bryan L. Guibijar, MSCS
Surigao del Sur State University – San Miguel Campus
Brgy. Carromata, 8301 San Miguel, Surigao del Sur, Philippines
guibijar.16@gmail.com
Abstract
This paper examined the usability of
developed Multiple file Encryption using
Rijndael Algorithm of College of Engineering,
Computer Studies and Technology in Surigao
del Sur State University – Main Campus. It is
based in waterfall model (SDLC) in which
descriptive research was applied to engineering
and computer science students. Data from the
pre-assessment survey and interview were
treated by using the weighted mean to determine
the level of usability of developed multiple file
encryption using Rijndael algorithm. The
usability of multiple file encryption to secure
different file types from malicious users/hackers.
Thus, the developed application is important to
protect the files of the students from
unauthorized use of their projects/programs
submitted.
Keywords: Cipher, Rijndael, File
management, algorithm,
development
1.0 Introduction
File security dramatically raises
issue especially in cloud computing which
raises concern in confidentiality, data
availability and data integrity
(Mukhopadhyay, Sonawane, Gupta,
Bhavsar, Mittal, 2013). This issue
commonly happen in some industry when
the employee separated. In fact, IT admin
faces felony for deleting files under flawed
hacking law (Greenberg, 2016). These leads
to catastrophe in file management in an
industry that may cause interruption in most
of the transaction and affect the growth of
the industry. The creation of cryptograph
using Rijndael algorithm as key
factor to solve the issues (Rouse, 2007). The
study aims to provide cryptograph using
Rijndael algorithm to enhance all type of
file security.
Cloud computing is promising and
efficient, but there are many challenges for
data privacy and security (Singla, Singh,
2013). According to Rouse (2007), Rijndael
algorithm is a new generation symmetric
block cipher that supports key sizes of 128,
192 and 256 bits. Thereby, the encryption or
decryption of a block of data is
accomplished by the iteration of a specific
transformation (Kaleigh, 2000). Although,
Rijndael Algorithm is selected by the U.S.
National Institute of Standards and
technology (NIST) as candidate for the
Advanced Encryption Standard (AES)
(Daemen, Rijmen, 2013). However, several
studies revealed the weaknesses of
RIJNDAEL (Kaleigh, 2000). Where in fact,
according to Hoang and Nguyen (2012) the
design uses an iterative looping approach
with block and key size of 128 bits.
Encryptions are popularly utilized to
protect files from unauthorized users and
malwares. Encryption was used to achieve
authenticated communication in computer
networks (Needham, Schroeder, 1978). In
fact, cryptography is necessary when
communicating over unreliable medium
(Pitchaiah, Daniel, 2012). However,
according to Townsend, (2015), the key
burned in their C# code, they are doing the
encryption but the encryption key is weak
and it’s just a password. Which revealed the
even using latest programming language
will be in vain without the help of the
International Journal of Research
Available at https://edupediapublications.org/journals
e-ISSN: 2348-6848
p-ISSN: 2348-795X
Volume 05 Issue 16
June 2018
Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 383
Rijndael Algorithm. With that, National
Institute of Standards and Technology
(NIST) adopted the Rijndael algorithm as
new Advanced Encryption Standard (AES)
to replace existing Data Encryption
Standard (DES) (Adib, Raissouni, 2012).
Implementation of Rijndael
algorithm to enhance all type of file security
provides resilient file management
especially in cloud computing. Thereby,
Cloud Cognitive Authenticator (CCA)
proposed provided by the Advanced
Encryption Standard (AES) which is the
Rijndael algorithm. Thus, enhancing the
security issues from unauthorized users and
malwares. The study increases the security
for confidentiality, data availability and data
integrity. It also creates harmonious
environment between the civilian users and
hackers. In fact, hackers doing may be
avoided using the Rijndael algorithm
encryption method.
2.0Theoretical/Conceptual
Framework
Figure 1. The Schema of the Study
The schema of this study explains
the development of multiple file encryption
using Rijndael Algorithm. The Multiple file
encryption using Rijndael Algorithm is an
application intended to encrypt different file
types to avoid file thief, file alter and file
damage by a virus. As a result student file
security will be strengthen.
Cyber Security Theory, according to
Kuusisto (2013) that the study on the key
concepts and terms of cyber security and
presents the physical world and the cyber
world framework. It also refers about the
society and uses of the model to analyze the
results of two limited media survey about
cyber-related newspaper. It also added that
the media survey indicate strong need to
organize the cyber world.
3.0 Methodology
The study is a descriptive type of
research in which survey questionnaire and
interview was applied to the students of
College of Engineering, Computer Studies
and Technology (CECST) to find out the
level of usability of the developed multiple
file encryption using Rijndael Algorithm
after utilizing the developed apps. The
survey instrument was validated by IT
experts two from College of Engineering,
Computer Studies and Technology and two
outsource.
The data collected were tabulated
and analysed. Appropriated statistical tool
were employed in the data analysis. Mean
was used to determine the usability of
developed multiple file encryption using
Rijndael Algorithm.
Figure 2. Rijndael Algorithm Round Transformation
Figure 2 - According to the creator
of Rijndael Algorithm the round
transformation is broken into layers and this
Developed Multiple
file Encryption using
Rijndael Algorithm
Usability of the
developed
Application
International Journal of Research
Available at https://edupediapublications.org/journals
e-ISSN: 2348-6848
p-ISSN: 2348-795X
Volume 05 Issue 16
June 2018
Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 384
layers are the linear mixing layer, which
provides high diffusion over multiple
rounds. The non-linear layer which are
basically application of the Rijndael S-box
and the key addition layer which is simply
an exclusive or of the round key and the
intermediate state. Each layer is designed to
have its own well-defined function which
increases resistance to linear and different
cryptanalysis.
Figure 3 – As illustrated in the data
flow diagram of the study, the file/s (Plain
Text) was process using Public Key. Under
Encryption is the application of the Rijndael
Algorithm in which encrypting the file/s to
hide the originally contain/form by
substituting special character and the like to
protect from malicious users. Cipher Text
label is the output of the encrypted file/s
that is not readable by human language or
natural language. Decryption process is the
process to return the file/s into its original
contain/form.
Figure 4 – Encryption Flow Chart,
using the sequential process in encrypting a
file. The oval (Terminal) symbol indicate
that the flow chart started and ended. The
Preparation/ Initialization symbol next to
start, it signifies the preparation of the data
it is also use to select initial conditions and
it is also used to represent instructions or
group of instructions that will alter or
modify a program’s course of execution.
The input / output symbol, data are to be
read into the computer memory from an
input device or data are to be passed from
the memory to an output device, in this flow
chart it is the input of 128 bytes password as
a secret key. The diamond (Decision)
symbol, it signifies any decisions that are to
be done, two alternative execution paths are
possible. The path to be followed is selected
during the execution by testing whether or
not the condition specified within the
outline is fulfilled. The rectangle
(Processing) symbol, perform any
calculation that are to be done. In decision
symbol there are two alternative execution
paths the ‘Yes’ and ‘No’, if yes the remark
is “File Encrypted Successfully”, but if no
the remark is “File Cannot be encrypted.
Password Mismatch!” in this illustration it
is password mismatch, but sometimes it can
Figure 3. Application Data Flow Diagram of the
Study
Figure 4. Encryption Flow Chart of the Study
Figure 4. Encryption Flow Chart of the
Study
International Journal of Research
Available at https://edupediapublications.org/journals
e-ISSN: 2348-6848
p-ISSN: 2348-795X
Volume 05 Issue 16
June 2018
Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 385
be the file is to large. As the flow near to the
end the output was successfully encrypted
with password protect to tighten the security
of the encrypted file/s.
Figure 5 – The Decryption Flow Chart of
the Study, is the reverse process to return
the file/s into the original contain/form. As
stated in figure 4, the process is the same
from start to initialize the file or selecting
the file to be decrypt. Then enter the
password and test if the password is correct
or incorrect. If not re-enter the password
and if correct proceed to successfully
decrypt the file/s selected, and finally the
original file/s can be read by human or can
be read using natural language.
4.0 Results and Discussions
Table 1 shows level of usability of
the developed application. It reveals that all
indicators are in the level of “Average”.
Thus, respondents give passing rate on the
developed application. It implies that the
program has needs some improvements to
gain higher rating other than average rate
application. Based in the mean shown in
table 1, the graphical user interface design
and operational performance is the lesser
mean. As the result shows that’s the
developer must improve the graphical user
interface and operational performance of the
developed application.
Table 2 shows factors level of
concept and difficult. As it is shown in the
table among the respondents 99.13% said
‘Yes’ they understand the concept of the
developed application and 0.87% said ‘No’
they don’t understand the concept of the
develop application. It is also shown that
2.61% said ‘Yes’ they encountered
difficulty while using the application and
97.39% said ‘No’ they don’t encountered
difficulty in using the develop application.
5.0 Conclusion
This study gets the usability of the
Development Multiple File Encryption
using Rijndael Algorithm, attempting to
give free hassle from malicious
users/hackers. In developing multiple file
encryption using Rijndael Algorithm,
developer must think about the encryption
application available in the internet. As
claim by Cyber Security Theory, to look
into the physical world and cyber world
Figure 5. Decryption Flow Chart of the Study
Table 1. Level of Usability of the Developed
Application using Rijndael Algorithm
Indicators Mean
Adjectival
Rating
1. How do you rate the
functionality of the apps in
terms of performance?
3.03 Average
2. How do you rate the graphical
user interface design of this
apps?
2.96 Average
3. How do you rate operational
performance of this apps?
2.95 Average
4. How do you rate the apps in
terms of users-friendliness?
3.00 Average
5. How do you rate the security of
the apps?
3.04 Average
Grand Mean 2.99 Average
Legend: 4.21-5.00-Excellent, 3.41-4.20-Good, 2.61-3.40-Average,
1.81-2.60-Poor, 1.00-1.80-Very Poor
Table 2. Factors level of Concept and
Difficult
YES NO
1. Do you understand the
concept of the
developed apps?
99.13% 0.87%
2. Did you encounter any
difficulty while using
the apps?
2.61% 97.39%
International Journal of Research
Available at https://edupediapublications.org/journals
e-ISSN: 2348-6848
p-ISSN: 2348-795X
Volume 05 Issue 16
June 2018
Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 386
framework and strongly recommend that the
media must reorganized the cyber world.
6. 0 Recommendation
Teachers may use more unique
activities to increase the reading comprehension
as well as the academic performance of
students. They may focus on what students need
to improve performance. An intervention or
plan of action shall be made to cater the
students’ problem in reading.
6.0 Recommendations
It is strongly recommended by the
author of this research to use the developed
application as tool in securing the file/s in
your computer. As the researcher
recommend to use this application, it is also
recommend not to use file encryption /
decryption downloaded from the internet.
Thus using application that is available to
all might be the reason of the file/s corrupt
and the file/s is not secure in some ways.
References Cited
Daemen, J., & Rijmen, V. (2013). The design of
Rijndael: AES-the advanced encryption
standard. Springer Science & Business
Media. Retrieve October 11, 2017 from
https://goo.gl/1DZm3n
El Adib, S., & Raissouni, N. (2012). AES encryption
algorithm hardware implementation
architecture: resource and execution time
optimization. International Journal of
Information and Network Security, 1(2),
110. Retrieve October 12, 2017 from
https://goo.gl/4wJZ2x
Hoang, T. (2012, February). An efficient FPGA
implementation of the Advanced Encryption
Standard algorithm. In Computing and
Communication Technologies, Research,
Innovation, and Vision for the Future
(RIVF), 2012 IEEE RIVF International
Conference on (pp. 1-4). IEEE. Retrieve
October 11, 2017 from
https://goo.gl/eFfQUv
Kaleigh (2000, November 15). Advanced Encryption
Standard. File. Retrieve October 10, 2017
from https://goo.gl/jYVZgs
Mukhopadhyay, D., Sonawane, G., Gupta, P. S.,
Bhavsar, S., & Mittal, V. (2013). Enhanced
security for cloud storage using file
encryption. arXiv preprint arXiv:1303.7075.
Retrieve October 10, 2017 from
https://arxiv.org/abs/1303.7075
Greenberg, A. (2016, June 03). ANDY GREEN
SECURITY. File. Retrieve October 10,
2017 from https://goo.gl/q3Q4gy
Needham, R. M., & Schroeder, M. D. (1978). Using
encryption for authentication in large
networks of computers. Communications of
the ACM, 21(12), 993-999. Retrieve
October 11, 2017 from
https://goo.gl/dj9SeR
Pitchaiah, M., & Daniel, P. (2012). Implementation
of advanced encryption standard algorithm.
Retrieve October 12, 2017 from
https://goo.gl/7wyzjX
Rauno Kuusisto, Tuija Kuusisto (October 2013).
Strategic Communication for Cyber-
Security Leadership. Journal of Information
Warfare, Volume 12, Issue 3. Retrieve May
22, 2018 from https://goo.gl/ga88Q8
Rouse, M. (2007, May). Rijndael. File. Retrieve
October 10, 2017 from
https://goo.gl/jYLBxU
Singla, S., & Singh, J. (2013). Survey on Enhancing
Cloud Data Security using EAP with
Rijndael Encryption Algorithm. Global
Journal of Computer Science and
Technology. Retrieve October 10, 2017
from https://goo.gl/H9ARHF
Townsend, P. (2015, December 23). Fixing
Encryption key management audit failures
in Microsoft Windows C# applications.
Retrieve October 12, 2017 from
https://goo.gl/Z4QDXP

More Related Content

What's hot

A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...
A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...
A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...IJCSIS Research Publications
 
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...IRJET Journal
 
Analysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic ToolsAnalysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic Toolsijeei-iaes
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGijcsit
 
Review on Automation Tool for ERD Normalization
Review on Automation Tool for ERD NormalizationReview on Automation Tool for ERD Normalization
Review on Automation Tool for ERD NormalizationIRJET Journal
 
Analysis of N Category Privacy Models
Analysis of N Category Privacy ModelsAnalysis of N Category Privacy Models
Analysis of N Category Privacy ModelsCSCJournals
 
Association rule visualization technique
Association rule visualization techniqueAssociation rule visualization technique
Association rule visualization techniquemustafasmart
 
information extraction by selamu shirtawi
information extraction by selamu shirtawiinformation extraction by selamu shirtawi
information extraction by selamu shirtawiselamu shirtawi
 
My harmony generating statistics from clinical text for monitoring clinical...
My harmony   generating statistics from clinical text for monitoring clinical...My harmony   generating statistics from clinical text for monitoring clinical...
My harmony generating statistics from clinical text for monitoring clinical...Conference Papers
 
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...ijcsit
 
Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...IJECEIAES
 
Smart Snap - Report
Smart Snap - ReportSmart Snap - Report
Smart Snap - ReportTapan Desai
 
Data analytics using R programming
Data analytics using R programmingData analytics using R programming
Data analytics using R programmingUmang Singh
 
Feature Based Semantic Polarity Analysis Through Ontology
Feature Based Semantic Polarity Analysis Through OntologyFeature Based Semantic Polarity Analysis Through Ontology
Feature Based Semantic Polarity Analysis Through OntologyIOSR Journals
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...IAEME Publication
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningIRJET Journal
 
IRJET-Unraveling the Data Structures of Big data, the HDFS Architecture and I...
IRJET-Unraveling the Data Structures of Big data, the HDFS Architecture and I...IRJET-Unraveling the Data Structures of Big data, the HDFS Architecture and I...
IRJET-Unraveling the Data Structures of Big data, the HDFS Architecture and I...IRJET Journal
 
Cyber risk at the edge: current and future trends on cyber risk analytics and...
Cyber risk at the edge: current and future trends on cyber risk analytics and...Cyber risk at the edge: current and future trends on cyber risk analytics and...
Cyber risk at the edge: current and future trends on cyber risk analytics and...Petar Radanliev
 
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedEfficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedIRJET Journal
 

What's hot (20)

A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...
A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...
A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...
 
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
 
Analysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic ToolsAnalysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic Tools
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
Review on Automation Tool for ERD Normalization
Review on Automation Tool for ERD NormalizationReview on Automation Tool for ERD Normalization
Review on Automation Tool for ERD Normalization
 
Analysis of N Category Privacy Models
Analysis of N Category Privacy ModelsAnalysis of N Category Privacy Models
Analysis of N Category Privacy Models
 
Association rule visualization technique
Association rule visualization techniqueAssociation rule visualization technique
Association rule visualization technique
 
information extraction by selamu shirtawi
information extraction by selamu shirtawiinformation extraction by selamu shirtawi
information extraction by selamu shirtawi
 
My harmony generating statistics from clinical text for monitoring clinical...
My harmony   generating statistics from clinical text for monitoring clinical...My harmony   generating statistics from clinical text for monitoring clinical...
My harmony generating statistics from clinical text for monitoring clinical...
 
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
 
Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...
 
Smart Snap - Report
Smart Snap - ReportSmart Snap - Report
Smart Snap - Report
 
Data analytics using R programming
Data analytics using R programmingData analytics using R programming
Data analytics using R programming
 
Feature Based Semantic Polarity Analysis Through Ontology
Feature Based Semantic Polarity Analysis Through OntologyFeature Based Semantic Polarity Analysis Through Ontology
Feature Based Semantic Polarity Analysis Through Ontology
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...
 
H0444146
H0444146H0444146
H0444146
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
 
IRJET-Unraveling the Data Structures of Big data, the HDFS Architecture and I...
IRJET-Unraveling the Data Structures of Big data, the HDFS Architecture and I...IRJET-Unraveling the Data Structures of Big data, the HDFS Architecture and I...
IRJET-Unraveling the Data Structures of Big data, the HDFS Architecture and I...
 
Cyber risk at the edge: current and future trends on cyber risk analytics and...
Cyber risk at the edge: current and future trends on cyber risk analytics and...Cyber risk at the edge: current and future trends on cyber risk analytics and...
Cyber risk at the edge: current and future trends on cyber risk analytics and...
 
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedEfficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
 

Similar to Usability of developed multiple file encryption using rijndael algorithm

Rijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption DevelopmentRijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption Developmentijtsrd
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...ijcsit
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewCSCJournals
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
 
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation ofcaijjournal
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemIJRES Journal
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issuesIAEME Publication
 

Similar to Usability of developed multiple file encryption using rijndael algorithm (20)

Rijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption DevelopmentRijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption Development
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating System
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Usability of developed multiple file encryption using rijndael algorithm

  • 1. International Journal of Research Available at https://edupediapublications.org/journals e-ISSN: 2348-6848 p-ISSN: 2348-795X Volume 05 Issue 16 June 2018 Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 382 Usability of Developed Multiple file Encryption using Rijndael Algorithm Bryan L. Guibijar, MSCS Surigao del Sur State University – San Miguel Campus Brgy. Carromata, 8301 San Miguel, Surigao del Sur, Philippines guibijar.16@gmail.com Abstract This paper examined the usability of developed Multiple file Encryption using Rijndael Algorithm of College of Engineering, Computer Studies and Technology in Surigao del Sur State University – Main Campus. It is based in waterfall model (SDLC) in which descriptive research was applied to engineering and computer science students. Data from the pre-assessment survey and interview were treated by using the weighted mean to determine the level of usability of developed multiple file encryption using Rijndael algorithm. The usability of multiple file encryption to secure different file types from malicious users/hackers. Thus, the developed application is important to protect the files of the students from unauthorized use of their projects/programs submitted. Keywords: Cipher, Rijndael, File management, algorithm, development 1.0 Introduction File security dramatically raises issue especially in cloud computing which raises concern in confidentiality, data availability and data integrity (Mukhopadhyay, Sonawane, Gupta, Bhavsar, Mittal, 2013). This issue commonly happen in some industry when the employee separated. In fact, IT admin faces felony for deleting files under flawed hacking law (Greenberg, 2016). These leads to catastrophe in file management in an industry that may cause interruption in most of the transaction and affect the growth of the industry. The creation of cryptograph using Rijndael algorithm as key factor to solve the issues (Rouse, 2007). The study aims to provide cryptograph using Rijndael algorithm to enhance all type of file security. Cloud computing is promising and efficient, but there are many challenges for data privacy and security (Singla, Singh, 2013). According to Rouse (2007), Rijndael algorithm is a new generation symmetric block cipher that supports key sizes of 128, 192 and 256 bits. Thereby, the encryption or decryption of a block of data is accomplished by the iteration of a specific transformation (Kaleigh, 2000). Although, Rijndael Algorithm is selected by the U.S. National Institute of Standards and technology (NIST) as candidate for the Advanced Encryption Standard (AES) (Daemen, Rijmen, 2013). However, several studies revealed the weaknesses of RIJNDAEL (Kaleigh, 2000). Where in fact, according to Hoang and Nguyen (2012) the design uses an iterative looping approach with block and key size of 128 bits. Encryptions are popularly utilized to protect files from unauthorized users and malwares. Encryption was used to achieve authenticated communication in computer networks (Needham, Schroeder, 1978). In fact, cryptography is necessary when communicating over unreliable medium (Pitchaiah, Daniel, 2012). However, according to Townsend, (2015), the key burned in their C# code, they are doing the encryption but the encryption key is weak and it’s just a password. Which revealed the even using latest programming language will be in vain without the help of the
  • 2. International Journal of Research Available at https://edupediapublications.org/journals e-ISSN: 2348-6848 p-ISSN: 2348-795X Volume 05 Issue 16 June 2018 Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 383 Rijndael Algorithm. With that, National Institute of Standards and Technology (NIST) adopted the Rijndael algorithm as new Advanced Encryption Standard (AES) to replace existing Data Encryption Standard (DES) (Adib, Raissouni, 2012). Implementation of Rijndael algorithm to enhance all type of file security provides resilient file management especially in cloud computing. Thereby, Cloud Cognitive Authenticator (CCA) proposed provided by the Advanced Encryption Standard (AES) which is the Rijndael algorithm. Thus, enhancing the security issues from unauthorized users and malwares. The study increases the security for confidentiality, data availability and data integrity. It also creates harmonious environment between the civilian users and hackers. In fact, hackers doing may be avoided using the Rijndael algorithm encryption method. 2.0Theoretical/Conceptual Framework Figure 1. The Schema of the Study The schema of this study explains the development of multiple file encryption using Rijndael Algorithm. The Multiple file encryption using Rijndael Algorithm is an application intended to encrypt different file types to avoid file thief, file alter and file damage by a virus. As a result student file security will be strengthen. Cyber Security Theory, according to Kuusisto (2013) that the study on the key concepts and terms of cyber security and presents the physical world and the cyber world framework. It also refers about the society and uses of the model to analyze the results of two limited media survey about cyber-related newspaper. It also added that the media survey indicate strong need to organize the cyber world. 3.0 Methodology The study is a descriptive type of research in which survey questionnaire and interview was applied to the students of College of Engineering, Computer Studies and Technology (CECST) to find out the level of usability of the developed multiple file encryption using Rijndael Algorithm after utilizing the developed apps. The survey instrument was validated by IT experts two from College of Engineering, Computer Studies and Technology and two outsource. The data collected were tabulated and analysed. Appropriated statistical tool were employed in the data analysis. Mean was used to determine the usability of developed multiple file encryption using Rijndael Algorithm. Figure 2. Rijndael Algorithm Round Transformation Figure 2 - According to the creator of Rijndael Algorithm the round transformation is broken into layers and this Developed Multiple file Encryption using Rijndael Algorithm Usability of the developed Application
  • 3. International Journal of Research Available at https://edupediapublications.org/journals e-ISSN: 2348-6848 p-ISSN: 2348-795X Volume 05 Issue 16 June 2018 Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 384 layers are the linear mixing layer, which provides high diffusion over multiple rounds. The non-linear layer which are basically application of the Rijndael S-box and the key addition layer which is simply an exclusive or of the round key and the intermediate state. Each layer is designed to have its own well-defined function which increases resistance to linear and different cryptanalysis. Figure 3 – As illustrated in the data flow diagram of the study, the file/s (Plain Text) was process using Public Key. Under Encryption is the application of the Rijndael Algorithm in which encrypting the file/s to hide the originally contain/form by substituting special character and the like to protect from malicious users. Cipher Text label is the output of the encrypted file/s that is not readable by human language or natural language. Decryption process is the process to return the file/s into its original contain/form. Figure 4 – Encryption Flow Chart, using the sequential process in encrypting a file. The oval (Terminal) symbol indicate that the flow chart started and ended. The Preparation/ Initialization symbol next to start, it signifies the preparation of the data it is also use to select initial conditions and it is also used to represent instructions or group of instructions that will alter or modify a program’s course of execution. The input / output symbol, data are to be read into the computer memory from an input device or data are to be passed from the memory to an output device, in this flow chart it is the input of 128 bytes password as a secret key. The diamond (Decision) symbol, it signifies any decisions that are to be done, two alternative execution paths are possible. The path to be followed is selected during the execution by testing whether or not the condition specified within the outline is fulfilled. The rectangle (Processing) symbol, perform any calculation that are to be done. In decision symbol there are two alternative execution paths the ‘Yes’ and ‘No’, if yes the remark is “File Encrypted Successfully”, but if no the remark is “File Cannot be encrypted. Password Mismatch!” in this illustration it is password mismatch, but sometimes it can Figure 3. Application Data Flow Diagram of the Study Figure 4. Encryption Flow Chart of the Study Figure 4. Encryption Flow Chart of the Study
  • 4. International Journal of Research Available at https://edupediapublications.org/journals e-ISSN: 2348-6848 p-ISSN: 2348-795X Volume 05 Issue 16 June 2018 Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 385 be the file is to large. As the flow near to the end the output was successfully encrypted with password protect to tighten the security of the encrypted file/s. Figure 5 – The Decryption Flow Chart of the Study, is the reverse process to return the file/s into the original contain/form. As stated in figure 4, the process is the same from start to initialize the file or selecting the file to be decrypt. Then enter the password and test if the password is correct or incorrect. If not re-enter the password and if correct proceed to successfully decrypt the file/s selected, and finally the original file/s can be read by human or can be read using natural language. 4.0 Results and Discussions Table 1 shows level of usability of the developed application. It reveals that all indicators are in the level of “Average”. Thus, respondents give passing rate on the developed application. It implies that the program has needs some improvements to gain higher rating other than average rate application. Based in the mean shown in table 1, the graphical user interface design and operational performance is the lesser mean. As the result shows that’s the developer must improve the graphical user interface and operational performance of the developed application. Table 2 shows factors level of concept and difficult. As it is shown in the table among the respondents 99.13% said ‘Yes’ they understand the concept of the developed application and 0.87% said ‘No’ they don’t understand the concept of the develop application. It is also shown that 2.61% said ‘Yes’ they encountered difficulty while using the application and 97.39% said ‘No’ they don’t encountered difficulty in using the develop application. 5.0 Conclusion This study gets the usability of the Development Multiple File Encryption using Rijndael Algorithm, attempting to give free hassle from malicious users/hackers. In developing multiple file encryption using Rijndael Algorithm, developer must think about the encryption application available in the internet. As claim by Cyber Security Theory, to look into the physical world and cyber world Figure 5. Decryption Flow Chart of the Study Table 1. Level of Usability of the Developed Application using Rijndael Algorithm Indicators Mean Adjectival Rating 1. How do you rate the functionality of the apps in terms of performance? 3.03 Average 2. How do you rate the graphical user interface design of this apps? 2.96 Average 3. How do you rate operational performance of this apps? 2.95 Average 4. How do you rate the apps in terms of users-friendliness? 3.00 Average 5. How do you rate the security of the apps? 3.04 Average Grand Mean 2.99 Average Legend: 4.21-5.00-Excellent, 3.41-4.20-Good, 2.61-3.40-Average, 1.81-2.60-Poor, 1.00-1.80-Very Poor Table 2. Factors level of Concept and Difficult YES NO 1. Do you understand the concept of the developed apps? 99.13% 0.87% 2. Did you encounter any difficulty while using the apps? 2.61% 97.39%
  • 5. International Journal of Research Available at https://edupediapublications.org/journals e-ISSN: 2348-6848 p-ISSN: 2348-795X Volume 05 Issue 16 June 2018 Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 386 framework and strongly recommend that the media must reorganized the cyber world. 6. 0 Recommendation Teachers may use more unique activities to increase the reading comprehension as well as the academic performance of students. They may focus on what students need to improve performance. An intervention or plan of action shall be made to cater the students’ problem in reading. 6.0 Recommendations It is strongly recommended by the author of this research to use the developed application as tool in securing the file/s in your computer. As the researcher recommend to use this application, it is also recommend not to use file encryption / decryption downloaded from the internet. Thus using application that is available to all might be the reason of the file/s corrupt and the file/s is not secure in some ways. References Cited Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media. Retrieve October 11, 2017 from https://goo.gl/1DZm3n El Adib, S., & Raissouni, N. (2012). AES encryption algorithm hardware implementation architecture: resource and execution time optimization. International Journal of Information and Network Security, 1(2), 110. Retrieve October 12, 2017 from https://goo.gl/4wJZ2x Hoang, T. (2012, February). An efficient FPGA implementation of the Advanced Encryption Standard algorithm. In Computing and Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), 2012 IEEE RIVF International Conference on (pp. 1-4). IEEE. Retrieve October 11, 2017 from https://goo.gl/eFfQUv Kaleigh (2000, November 15). Advanced Encryption Standard. File. Retrieve October 10, 2017 from https://goo.gl/jYVZgs Mukhopadhyay, D., Sonawane, G., Gupta, P. S., Bhavsar, S., & Mittal, V. (2013). Enhanced security for cloud storage using file encryption. arXiv preprint arXiv:1303.7075. Retrieve October 10, 2017 from https://arxiv.org/abs/1303.7075 Greenberg, A. (2016, June 03). ANDY GREEN SECURITY. File. Retrieve October 10, 2017 from https://goo.gl/q3Q4gy Needham, R. M., & Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 993-999. Retrieve October 11, 2017 from https://goo.gl/dj9SeR Pitchaiah, M., & Daniel, P. (2012). Implementation of advanced encryption standard algorithm. Retrieve October 12, 2017 from https://goo.gl/7wyzjX Rauno Kuusisto, Tuija Kuusisto (October 2013). Strategic Communication for Cyber- Security Leadership. Journal of Information Warfare, Volume 12, Issue 3. Retrieve May 22, 2018 from https://goo.gl/ga88Q8 Rouse, M. (2007, May). Rijndael. File. Retrieve October 10, 2017 from https://goo.gl/jYLBxU Singla, S., & Singh, J. (2013). Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm. Global Journal of Computer Science and Technology. Retrieve October 10, 2017 from https://goo.gl/H9ARHF Townsend, P. (2015, December 23). Fixing Encryption key management audit failures in Microsoft Windows C# applications. Retrieve October 12, 2017 from https://goo.gl/Z4QDXP