Comp Security
Comp Security
Conduct primary, secondary, and such other examinations within Uganda as it may
consider desirable in the public interest.
Publish past examination papers.
Award certificates to successful candidates in such examinations.
Invite anybody or bodies outside Uganda, as it may think fit, and to jointly conduct
academic and other examinations.
Award acceptable certificates to successful candidates jointly with the invited bodies;
Invite other bodies, as it may think fit, to conduct examinations and award acceptable
certificates or diplomas;
Advise anybody or bodies so invited under paragraph (f) upon the adaptation of
examinations necessary for the requirements of Uganda and to assist any such body or
bodies to conduct such examinations.
Make arrangements for the conduct of research and development of examination systems.
3.0 BODY.
Uganda National Examination Board (UNEB) introduced an electronic data transfer system to
enhance the accuracy of capturing candidate’s marks.
The new system was introduced during the marking of the Uganda Advanced Certificate of
Education-UACE examination results in 2021.
Unlike in the past where candidates’ marks were transferred from various marking centers across
the country to UNEB offices in Kyambogo where they would be entered in a data base manually,
under the new system marks are entered into the database from the different marking cites.
UNEB has installed electronic equipment at each UACE marking center which are connected to
the UNEB data center in Kyambogo through a wireless system.
The UNEB Board chairperson, Prof. Mary Akwakol says they used the new system to capture
student’s score twice so as to detect and eliminate any discrepancies.
UNEB used six marking centers during UACE, 11 for Primary Leaving Examinations-PLE and
17 for Uganda Certificate of Education-UCE.
The UNEB General Secretary, Dan Odongo says the new system eliminates risks associated with
manual transfer of marks.
The manual system he says exposes the data to risks like human interference, misplacement and
delayed delivery when the person delivering the marks does not find the right person.
UNEB says the system will be rolled out to cover PLE and UCE this academic year.
With such developments at UNEB, a secure data transfer mechanism has to be used
3.2 How data will be transferred using asymmetric encryption at UNEB
Keys to note.
Data from the various UNEB marking centers is sent as plain text data.
That plain text data is then encrypted using the sender’s (marking center) public key and
converted to ciphered data.
The ciphered data is then delivered to the UNEB offices but it is first decrypted using the
UNEB office private key.
Data security. Due to the sensitivity of data at UNEB asymmetric encryption is needed, this is
because it’s strongly secure and it involves a lot of multiple key players so that it becomes very
hard for hackers and crackers to figure out the keys to decrypt the data.
Integrity of Information Exchange. One way the hash of the data to be exchanged is created
and encrypted using the sender’s private key. Encrypted hash and data are exchanged with the
receiver. Using the sender’s public key, the receiver decrypts the hash and recreates the hash.
Any difference between the two hashes indicates the content is altered after signature and
integrity are lost. This much needed at UNEB offices.
Non-repudiation. With the digital signature encryption tool in place, the sender of information
from the marking centers to the UNEB head office cannot disown the content, and a transaction
done online cannot be disowned by its originator.
It is convenient. Asymmetric encryption solves the problem of distributing keys for encryption,
with everyone publishing their public keys, while private keys being kept secret.
It detects tampering. With digital signatures in public key encryption, message recipients can
detect if a message was altered in transit.
Asymmetric encryption provides a platform for securely exchanging information without having
to share private keys. Non-repudiation, Authentication using Digital signatures, and Integrity are
the other unique features offered by this encryption.
This method also overcomes the lacuna of Symmetric encryption (the need to exchange the
secret key used for encryption/decryption) by exchanging the key alone through public
key/private key in an asymmetric way and still exchanging high volume data using symmetric
mode.
4.0 CONCLUSION
When you are to choose the best data encryption mechanism to be used by Uganda national
examination board (UNEB), the best option would be an encryption mechanism that has the
following aspects; data security, confidentiality, authenticity, integrity of information exchange,
non-repudiation and convenient. This is because of the kind of information held by UNEB which
is so vital for all students that take up the examinations and any loss of such data can be very
costly both for the UNEB officials and the students involved. With all this said asymmetric
encryption mechanism stands above symmetric mechanism.
5.0 RECOMMENDATION
The Uganda national examinations board (UNEB) has sensitive and important data and the only
data encryption mechanism required to be used during transit of all sensitive data will be
asymmetric data encryption mechanism.
REFERENCES