Protection of text using SHA1 and Base64

Protection of information is a prerequisite demand in the world of computers today. Protection of information can be accomplished in different methods. The main objective of the use of the protection of information is to protect data and information in order to achieve privacy. This paper discusses...

全面介紹

Saved in:
書目詳細資料
Main Authors: Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi
格式: Conference or Workshop Item
語言:English
出版: 2012
主題:
在線閱讀:http://irep.iium.edu.my/24418/1/crypto-conf-langkawi.pdf
http://irep.iium.edu.my/24418/
http://math.usm.my/cryptology2012/
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:Protection of information is a prerequisite demand in the world of computers today. Protection of information can be accomplished in different methods. The main objective of the use of the protection of information is to protect data and information in order to achieve privacy. This paper discusses two methods of protection of information, an encryption method called Base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The SHA1 hash function is used to hash the encrypted file performed by Base64. As an example of an ASCII code, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data.