Protection of text using SHA1 and Base64
Protection of information is a prerequisite demand in the world of computers today. Protection of information can be accomplished in different methods. The main objective of the use of the protection of information is to protect data and information in order to achieve privacy. This paper discusses...
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/24418/ http://irep.iium.edu.my/24418/ http://irep.iium.edu.my/24418/1/crypto-conf-langkawi.pdf |
id |
iium-24418 |
---|---|
recordtype |
eprints |
spelling |
iium-244182012-07-24T03:58:20Z http://irep.iium.edu.my/24418/ Protection of text using SHA1 and Base64 Taha, Imad Alahmad, Mohammad Ahmad, Hanadi QA75 Electronic computers. Computer science Protection of information is a prerequisite demand in the world of computers today. Protection of information can be accomplished in different methods. The main objective of the use of the protection of information is to protect data and information in order to achieve privacy. This paper discusses two methods of protection of information, an encryption method called Base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The SHA1 hash function is used to hash the encrypted file performed by Base64. As an example of an ASCII code, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data. 2012-06-04 Conference or Workshop Item NonPeerReviewed application/pdf en http://irep.iium.edu.my/24418/1/crypto-conf-langkawi.pdf Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012, 4-6 June, 2012, Langkawi. http://math.usm.my/cryptology2012/ |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Taha, Imad Alahmad, Mohammad Ahmad, Hanadi Protection of text using SHA1 and Base64 |
description |
Protection of information is a prerequisite demand in the world of computers today. Protection of information can be accomplished in different methods. The main objective of the use of the protection of information is to protect data and information in order to achieve privacy. This paper discusses two methods of protection of information, an encryption method called Base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The SHA1 hash function is used to hash the encrypted file performed by Base64. As an example of an ASCII code, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data. |
format |
Conference or Workshop Item |
author |
Taha, Imad Alahmad, Mohammad Ahmad, Hanadi |
author_facet |
Taha, Imad Alahmad, Mohammad Ahmad, Hanadi |
author_sort |
Taha, Imad |
title |
Protection of text using SHA1 and Base64 |
title_short |
Protection of text using SHA1 and Base64 |
title_full |
Protection of text using SHA1 and Base64 |
title_fullStr |
Protection of text using SHA1 and Base64 |
title_full_unstemmed |
Protection of text using SHA1 and Base64 |
title_sort |
protection of text using sha1 and base64 |
publishDate |
2012 |
url |
http://irep.iium.edu.my/24418/ http://irep.iium.edu.my/24418/ http://irep.iium.edu.my/24418/1/crypto-conf-langkawi.pdf |
first_indexed |
2023-09-18T20:36:35Z |
last_indexed |
2023-09-18T20:36:35Z |
_version_ |
1777409086942347264 |