Implementation of hashed cryptography algorithm based on cryptography message syntax
This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and t...
Saved in:
主要作者: | |
---|---|
格式: | Thesis |
语言: | English English English |
出版: |
2019
|
主题: | |
在线阅读: | http://eprints.uthm.edu.my/562/1/24p%20MOHAMMED%20AHNAF%20ALI.pdf http://eprints.uthm.edu.my/562/2/MOHAMMED%20AHNAF%20ALI%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/562/3/MOHAMMED%20AHNAF%20ALI%20WATERMARK.pdf http://eprints.uthm.edu.my/562/ |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
id |
my.uthm.eprints.562 |
---|---|
record_format |
eprints |
spelling |
my.uthm.eprints.5622021-08-05T03:26:38Z http://eprints.uthm.edu.my/562/ Implementation of hashed cryptography algorithm based on cryptography message syntax Ali, Mohammed Ahnaf QA76 Computer software This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. The important study in this research is an automated learning system for deep learning to enhance security. Through system training, security can be improved. The incoming data will be checked and the system will determine whether it contains errors or false data. The system will determine after the defragmentation function, and the next thing is the key length tracking message programming. This is to make sure that the master message follows formatting in the hash. Anything that does not follow the hash format in the system or panel will be ignored. There is a transmitter transmitting the message in a series of blocks. There is a receiver receiving the message in a series of blocks. Messages in the transmitter are protected by fragmentation and arranged in encryption. This is according to the syntax algorithm. One of the two messages is deliberately rearranging and attacking by malicious. The problematic message uses light blue representation in simulation. The sent message uses the red color representation in the simulation. Hence, the fragmented CMS encryption algorithm will solve this problem and the errors in the message will be removed. The receiver must receive a clean message chain without errors. The requested messages sent from the sender and the receiver are used by the green receiver to represent. By the end of the research, the animation and animation system will be introduced to show the basic process of network enhancement with the automated learning system. 2019-07 Thesis NonPeerReviewed text en http://eprints.uthm.edu.my/562/1/24p%20MOHAMMED%20AHNAF%20ALI.pdf text en http://eprints.uthm.edu.my/562/2/MOHAMMED%20AHNAF%20ALI%20COPYRIGHT%20DECLARATION.pdf text en http://eprints.uthm.edu.my/562/3/MOHAMMED%20AHNAF%20ALI%20WATERMARK.pdf Ali, Mohammed Ahnaf (2019) Implementation of hashed cryptography algorithm based on cryptography message syntax. Masters thesis, Universiti Tun Hussein Onn Malaysia. |
institution |
Universiti Tun Hussein Onn Malaysia |
building |
UTHM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tun Hussein Onn Malaysia |
content_source |
UTHM Institutional Repository |
url_provider |
http://eprints.uthm.edu.my/ |
language |
English English English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Ali, Mohammed Ahnaf Implementation of hashed cryptography algorithm based on cryptography message syntax |
description |
This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. The important study in this research is an automated learning system for deep learning to enhance security. Through system training, security can be improved. The incoming data will be checked and the system will determine whether it contains errors or false data. The system will determine after the defragmentation function, and the next thing is the key length tracking message programming. This is to make sure that the master message follows formatting in the hash. Anything that does not follow the hash format in the system or panel will be ignored. There is a transmitter transmitting the message in a series of blocks. There is a receiver receiving the message in a series of blocks. Messages in the transmitter are protected by fragmentation and arranged in encryption. This is according to the syntax algorithm. One of the two messages is deliberately rearranging and attacking by malicious. The problematic message uses light blue representation in simulation. The sent message uses the red color representation in the simulation. Hence, the fragmented CMS encryption algorithm will solve this problem and the errors in the message will be removed. The receiver must receive a clean message chain without errors. The requested messages sent from the sender and the receiver are used by the green receiver to represent. By the end of the research, the animation and animation system will be introduced to show the basic process of network enhancement with the automated learning system. |
format |
Thesis |
author |
Ali, Mohammed Ahnaf |
author_facet |
Ali, Mohammed Ahnaf |
author_sort |
Ali, Mohammed Ahnaf |
title |
Implementation of hashed cryptography algorithm based on cryptography message syntax |
title_short |
Implementation of hashed cryptography algorithm based on cryptography message syntax |
title_full |
Implementation of hashed cryptography algorithm based on cryptography message syntax |
title_fullStr |
Implementation of hashed cryptography algorithm based on cryptography message syntax |
title_full_unstemmed |
Implementation of hashed cryptography algorithm based on cryptography message syntax |
title_sort |
implementation of hashed cryptography algorithm based on cryptography message syntax |
publishDate |
2019 |
url |
http://eprints.uthm.edu.my/562/1/24p%20MOHAMMED%20AHNAF%20ALI.pdf http://eprints.uthm.edu.my/562/2/MOHAMMED%20AHNAF%20ALI%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/562/3/MOHAMMED%20AHNAF%20ALI%20WATERMARK.pdf http://eprints.uthm.edu.my/562/ |
_version_ |
1738580753008033792 |
score |
13.251813 |