Security Study and Encryption / Decryption Method
Secure data transmission is done with a technology called encryption. Encryption software scrambles the data with a secret code so that no one can make sense of it while it's being transmitted. When the data reaches its destination, the same software unscrambles the information. Often the obje...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English English |
Published: |
2000
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/10492/1/FK_2000_26.pdf http://psasir.upm.edu.my/id/eprint/10492/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Putra Malaysia |
Language: | English English |
id |
my.upm.eprints.10492 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.104922024-04-03T00:50:42Z http://psasir.upm.edu.my/id/eprint/10492/ Security Study and Encryption / Decryption Method Al-Qdah, Majdi Taysir Secure data transmission is done with a technology called encryption. Encryption software scrambles the data with a secret code so that no one can make sense of it while it's being transmitted. When the data reaches its destination, the same software unscrambles the information. Often the objectives of information security systems like encryption can only be achieved by following procedural techniques and abidance of laws. This work presents an Encryption/ Decryption System that relies on a method of data rotation and XOR operations to obtain an encryption key. It uses an encryption Master Key that is a combination of both an input password Male Key and a randomly generated number called the Female Key. The decryption procedure relies on flipping of the master key to obtain the Negative Master Key and then follows the same procedure of encryption but with a reversed Master Key. Creating the Encryption/ Decryption System was achieved by programming with Object-Oriented Pascal under Delphi 5.0 software. Testing the system was done by taking different types of files like text, image, and video and encrypting and then decrypting them using the system. The results obtained showed that in fact the system is able to perform both encryption and decryption for all sorts of files. 2000-10 Thesis NonPeerReviewed text en http://psasir.upm.edu.my/id/eprint/10492/1/FK_2000_26.pdf Al-Qdah, Majdi Taysir (2000) Security Study and Encryption / Decryption Method. Masters thesis, Universiti Putra Malaysia. Data encryption (Computer science) English |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English English |
topic |
Data encryption (Computer science) |
spellingShingle |
Data encryption (Computer science) Al-Qdah, Majdi Taysir Security Study and Encryption / Decryption Method |
description |
Secure data transmission is done with a technology called
encryption. Encryption software scrambles the data with a secret code so that no one can make sense of it while it's being transmitted. When the data reaches its destination, the same software unscrambles the information. Often the objectives of information security systems like encryption can only be achieved by following procedural techniques and abidance of laws. This work presents an Encryption/ Decryption System that relies on a method of data rotation and XOR operations to obtain an encryption key. It uses an encryption Master Key that is a combination of both an input password Male Key and a randomly generated number called the Female Key. The decryption procedure relies on flipping of the master key to obtain the Negative Master Key
and then follows the same procedure of encryption but with a
reversed Master Key. Creating the Encryption/ Decryption System was achieved by programming with Object-Oriented Pascal under Delphi 5.0 software. Testing the system was done by taking different types of files like text, image, and video and encrypting and then decrypting them using the system. The results obtained showed that in fact the
system is able to perform both encryption and decryption for all sorts of files. |
format |
Thesis |
author |
Al-Qdah, Majdi Taysir |
author_facet |
Al-Qdah, Majdi Taysir |
author_sort |
Al-Qdah, Majdi Taysir |
title |
Security Study and Encryption / Decryption Method |
title_short |
Security Study and Encryption / Decryption Method |
title_full |
Security Study and Encryption / Decryption Method |
title_fullStr |
Security Study and Encryption / Decryption Method |
title_full_unstemmed |
Security Study and Encryption / Decryption Method |
title_sort |
security study and encryption / decryption method |
publishDate |
2000 |
url |
http://psasir.upm.edu.my/id/eprint/10492/1/FK_2000_26.pdf http://psasir.upm.edu.my/id/eprint/10492/ |
_version_ |
1797910825642491904 |