Security Study and Encryption / Decryption Method

Secure data transmission is done with a technology called encryption. Encryption software scrambles the data with a secret code so that no one can make sense of it while it's being transmitted. When the data reaches its destination, the same software unscrambles the information. Often the obje...

Full description

Saved in:
Bibliographic Details
Main Author: Al-Qdah, Majdi Taysir
Format: Thesis
Language:English
English
Published: 2000
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/10492/1/FK_2000_26.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-upm-ir.10492
record_format uketd_dc
spelling my-upm-ir.104922024-04-03T00:50:42Z Security Study and Encryption / Decryption Method 2000-10 Al-Qdah, Majdi Taysir Secure data transmission is done with a technology called encryption. Encryption software scrambles the data with a secret code so that no one can make sense of it while it's being transmitted. When the data reaches its destination, the same software unscrambles the information. Often the objectives of information security systems like encryption can only be achieved by following procedural techniques and abidance of laws. This work presents an Encryption/ Decryption System that relies on a method of data rotation and XOR operations to obtain an encryption key. It uses an encryption Master Key that is a combination of both an input password Male Key and a randomly generated number called the Female Key. The decryption procedure relies on flipping of the master key to obtain the Negative Master Key and then follows the same procedure of encryption but with a reversed Master Key. Creating the Encryption/ Decryption System was achieved by programming with Object-Oriented Pascal under Delphi 5.0 software. Testing the system was done by taking different types of files like text, image, and video and encrypting and then decrypting them using the system. The results obtained showed that in fact the system is able to perform both encryption and decryption for all sorts of files. Data encryption (Computer science) 2000-10 Thesis http://psasir.upm.edu.my/id/eprint/10492/ http://psasir.upm.edu.my/id/eprint/10492/1/FK_2000_26.pdf text en public masters Universiti Putra Malaysia Data encryption (Computer science) Faculty of Engineering English
institution Universiti Putra Malaysia
collection PSAS Institutional Repository
language English
English
topic Data encryption (Computer science)


spellingShingle Data encryption (Computer science)


Al-Qdah, Majdi Taysir
Security Study and Encryption / Decryption Method
description Secure data transmission is done with a technology called encryption. Encryption software scrambles the data with a secret code so that no one can make sense of it while it's being transmitted. When the data reaches its destination, the same software unscrambles the information. Often the objectives of information security systems like encryption can only be achieved by following procedural techniques and abidance of laws. This work presents an Encryption/ Decryption System that relies on a method of data rotation and XOR operations to obtain an encryption key. It uses an encryption Master Key that is a combination of both an input password Male Key and a randomly generated number called the Female Key. The decryption procedure relies on flipping of the master key to obtain the Negative Master Key and then follows the same procedure of encryption but with a reversed Master Key. Creating the Encryption/ Decryption System was achieved by programming with Object-Oriented Pascal under Delphi 5.0 software. Testing the system was done by taking different types of files like text, image, and video and encrypting and then decrypting them using the system. The results obtained showed that in fact the system is able to perform both encryption and decryption for all sorts of files.
format Thesis
qualification_level Master's degree
author Al-Qdah, Majdi Taysir
author_facet Al-Qdah, Majdi Taysir
author_sort Al-Qdah, Majdi Taysir
title Security Study and Encryption / Decryption Method
title_short Security Study and Encryption / Decryption Method
title_full Security Study and Encryption / Decryption Method
title_fullStr Security Study and Encryption / Decryption Method
title_full_unstemmed Security Study and Encryption / Decryption Method
title_sort security study and encryption / decryption method
granting_institution Universiti Putra Malaysia
granting_department Faculty of Engineering
publishDate 2000
url http://psasir.upm.edu.my/id/eprint/10492/1/FK_2000_26.pdf
_version_ 1804888552463400960