A Model for Evaluation of Cryptography Algorithm on UUM Portal
The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. The development of the simulation model consists of seven steps. The steps are problem definition,...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | eng eng |
Published: |
2004
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/1393/1/NORLIANA_ABDUL_MAJID.pdf https://etd.uum.edu.my/1393/2/1.NORLIANA_ABDUL_MAJID.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uum-etd.1393 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Utara Malaysia |
collection |
UUM ETD |
language |
eng eng |
topic |
QA Mathematics |
spellingShingle |
QA Mathematics Norliana, Abdul Majid A Model for Evaluation of Cryptography Algorithm on UUM Portal |
description |
The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. The development of the simulation model consists of seven steps. The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. The development of of simulation model involves three level of development. Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. This project concludes by discussing problems and limitations that were encountered in completing this project, and offers a few recommendations for future development in this area. |
format |
Thesis |
qualification_name |
masters |
qualification_level |
Master's degree |
author |
Norliana, Abdul Majid |
author_facet |
Norliana, Abdul Majid |
author_sort |
Norliana, Abdul Majid |
title |
A Model for Evaluation of Cryptography Algorithm on UUM Portal |
title_short |
A Model for Evaluation of Cryptography Algorithm on UUM Portal |
title_full |
A Model for Evaluation of Cryptography Algorithm on UUM Portal |
title_fullStr |
A Model for Evaluation of Cryptography Algorithm on UUM Portal |
title_full_unstemmed |
A Model for Evaluation of Cryptography Algorithm on UUM Portal |
title_sort |
model for evaluation of cryptography algorithm on uum portal |
granting_institution |
Universiti Utara Malaysia |
granting_department |
Faculty of Information Technology |
publishDate |
2004 |
url |
https://etd.uum.edu.my/1393/1/NORLIANA_ABDUL_MAJID.pdf https://etd.uum.edu.my/1393/2/1.NORLIANA_ABDUL_MAJID.pdf |
_version_ |
1747827137347321856 |
spelling |
my-uum-etd.13932013-07-24T12:11:46Z A Model for Evaluation of Cryptography Algorithm on UUM Portal 2004 Norliana, Abdul Majid Faculty of Information Technology Faculty of Information Technology QA Mathematics The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. The development of the simulation model consists of seven steps. The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. The development of of simulation model involves three level of development. Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. This project concludes by discussing problems and limitations that were encountered in completing this project, and offers a few recommendations for future development in this area. 2004 Thesis https://etd.uum.edu.my/1393/ https://etd.uum.edu.my/1393/1/NORLIANA_ABDUL_MAJID.pdf application/pdf eng validuser https://etd.uum.edu.my/1393/2/1.NORLIANA_ABDUL_MAJID.pdf application/pdf eng public masters masters Universiti Utara Malaysia Bassham, L.E., (2000). Efficiency Testings ANSI implementation of Round 2 Candidate Algorithms For The Advanced Encryption Standard. Coopersmith, D., Gennaro, R., Halevi, S., Jutla, C., Matyas, S. M., Peyravian, M.,Safford, D., and Zunic, N., (2000). IBM Comments. Third AES Conference. Daemon, J., and Rijmaen, V., (2000). Rijnclael for AES. 3rd AES Conference. Dray, J., (1999). Report on The NIST Java AES Candidate Algorithm analysis. Retrieve from http://csrc.nist. go/encryption_Standard_Candidate_Conference. Dray, J.,( 2000). Report on NET Performance Analysis of The Final Round Java AES Candidates. Retrieve from http://csrc.nist.gov/encryption_Standard_Candidate_Conference Foo, S., Leong, P. C., Hui, S. C., and Liu, S., (1999) Security Consideration in The Delivery of Web-based Application: A Case Study. Information management and Computer Security 7(l),pp.40-49. Gladdman, B . , (1999). implementation Experience With AES Candidate Algorithms Second AES Conference Hazari, S., (2002). Challenges of implementing Public Key Infrastructure in Netcentric Enterprises. Logistics Information management,15(5/6), pp.385-392. Irakleous, I., Furnel, S. M., Dowland, P. S., and Papadaki, M., (2002). An Experimental Comparison of Secret-based User Authentication Technologies. Information management and Computer Security, 10(3), pp.100-108. Kamal, M. Z., and Amir, M. A. S., (2004). Password Retrieval Mechanism: An Evaluation on UUM Web Portal. Nechvatal, J., Barker, E., Bassharn, L., Burr, W., Foti, J., and Robck, E., (2000). Report on The Development of Advanced Encryption Standard (AES). Retrieved from http://www.nistg.gov/aes/ Rivest, R, . L., Robshaw, M. J. B., Sidney, R., and Yin Y. L., (1999). The RC6 Block Cipher. NIST AES proposal. Saarinen, V., (2000). Speed Versus Security. Retrieve from http://www.tml.hut.fi/Studies/Tik-110300/2000/Newtech/speed_sec_1.html. Sadeh, T., and Walker, J., (2003). Library Portal: Toward The Semantic Web. New Library world, 104(1184/1185), pp.11-19. retrieved from http://www.emeraldinsight.com/0307-4803.htm Schneier, B., (1995). E-mail Security: How to Keep Your Electronics Message Private. New York: John Wiley & Sons Inc. Schneier, B., and Whiting, D., (2000). A Performance Comparison of The Five AES Finalist. Schneier, B., Kelsey , J., Whiting, D., Hall, C., and Ferguson, N., (1999). The Twofish as an AES Candidates. Splaine , S . (2002). Testing Web Security: Assessment The Security of Key Sites and Applications. Indianapolis, Indiana: Wiley Publishing Inc. Sterbenz, A., and Lipp, P., (2000). Performance of The AES Candidates Algorithm its Jaw. Retrieve from http://csrc.nist.eov/encn.ption/aes. Turban, E . , and Aronsson, J. E., (1998). Decision Support Systems and Intelligent Systemics for international Edition. Upper Saddler River, N. J: Prentice Hall. |