Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)

Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Depart...

Full description

Saved in:
Bibliographic Details
Main Author: Shuwandy, Moceheb Lazam
Format: Thesis
Language:English
English
Published: 2012
Subjects:
Online Access:http://etd.uum.edu.my/2946/1/Moceheb_Lazam_Shuwandy.pdf
http://etd.uum.edu.my/2946/4/Moceheb_Lazam_Shuwandy.pdf
http://etd.uum.edu.my/2946/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.etd.2946
record_format eprints
spelling my.uum.etd.29462016-04-27T07:51:50Z http://etd.uum.edu.my/2946/ Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) Shuwandy, Moceheb Lazam QA76 Computer software Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Department of Defense and launched in the eighties to the world. Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. It was called MOLAZ. It used two algorithms AES 128 and AES 256 bits, and switching between them using special key (K,). In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. Therefore, in 2011 appeared MOLAZ-SM. It presents a study is the development of this system by adding the mask technique to prevent the use of the style of repeated attempts to enter the key. The system depends on the base "If you enter a true key, you obtain to the truth information, but if you enter the false key; you obtains to the false information." 2012 Thesis NonPeerReviewed text en http://etd.uum.edu.my/2946/1/Moceheb_Lazam_Shuwandy.pdf text en http://etd.uum.edu.my/2946/4/Moceheb_Lazam_Shuwandy.pdf Shuwandy, Moceheb Lazam (2012) Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM). Masters thesis, Universiti Utara Malaysia.
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Electronic Theses
url_provider http://etd.uum.edu.my/
language English
English
topic QA76 Computer software
spellingShingle QA76 Computer software
Shuwandy, Moceheb Lazam
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
description Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Department of Defense and launched in the eighties to the world. Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. It was called MOLAZ. It used two algorithms AES 128 and AES 256 bits, and switching between them using special key (K,). In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. Therefore, in 2011 appeared MOLAZ-SM. It presents a study is the development of this system by adding the mask technique to prevent the use of the style of repeated attempts to enter the key. The system depends on the base "If you enter a true key, you obtain to the truth information, but if you enter the false key; you obtains to the false information."
format Thesis
author Shuwandy, Moceheb Lazam
author_facet Shuwandy, Moceheb Lazam
author_sort Shuwandy, Moceheb Lazam
title Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_short Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_full Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_fullStr Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_full_unstemmed Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_sort smile mask development of cryptography performance of molaz method (molaz-sm)
publishDate 2012
url http://etd.uum.edu.my/2946/1/Moceheb_Lazam_Shuwandy.pdf
http://etd.uum.edu.my/2946/4/Moceheb_Lazam_Shuwandy.pdf
http://etd.uum.edu.my/2946/
_version_ 1644276838536577024
score 13.211869