Protection of the texts using Base64 and MD5

The encryption process combines mathematics and computer science. Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. The main...

Full description

Bibliographic Details
Main Authors: Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi
Format: Article
Language:English
Published: Design for Scientific Renaissance 2012
Subjects:
Online Access:http://irep.iium.edu.my/22164/
http://irep.iium.edu.my/22164/
http://irep.iium.edu.my/22164/1/212-1036-1-PB.pdf
id iium-22164
recordtype eprints
spelling iium-221642012-04-10T04:01:31Z http://irep.iium.edu.my/22164/ Protection of the texts using Base64 and MD5 Taha, Imad Alahmad, Mohammad Ahmad, Hanadi QA75 Electronic computers. Computer science The encryption process combines mathematics and computer science. Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The MD5 hash function is used to hash the encrypted file performed by Base64. As an example for the two protection mechanisms, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data. Design for Scientific Renaissance 2012-03-01 Article PeerReviewed application/pdf en http://irep.iium.edu.my/22164/1/212-1036-1-PB.pdf Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (1). pp. 22-34. ISSN 2231-8852 http://www.sign-ific-ance.co.uk/dsr/index.php/JACSTR
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Taha, Imad
Alahmad, Mohammad
Ahmad, Hanadi
Protection of the texts using Base64 and MD5
description The encryption process combines mathematics and computer science. Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The MD5 hash function is used to hash the encrypted file performed by Base64. As an example for the two protection mechanisms, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data.
format Article
author Taha, Imad
Alahmad, Mohammad
Ahmad, Hanadi
author_facet Taha, Imad
Alahmad, Mohammad
Ahmad, Hanadi
author_sort Taha, Imad
title Protection of the texts using Base64 and MD5
title_short Protection of the texts using Base64 and MD5
title_full Protection of the texts using Base64 and MD5
title_fullStr Protection of the texts using Base64 and MD5
title_full_unstemmed Protection of the texts using Base64 and MD5
title_sort protection of the texts using base64 and md5
publisher Design for Scientific Renaissance
publishDate 2012
url http://irep.iium.edu.my/22164/
http://irep.iium.edu.my/22164/
http://irep.iium.edu.my/22164/1/212-1036-1-PB.pdf
first_indexed 2023-09-18T20:33:53Z
last_indexed 2023-09-18T20:33:53Z
_version_ 1777408917075132416