Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)

Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Depart...

Full description

Saved in:
Bibliographic Details
Main Author: Shuwandy, Moceheb Lazam
Format: Thesis
Language:en
en
Published: 2012
Subjects:
Online Access:https://etd.uum.edu.my/2946/1/Moceheb_Lazam_Shuwandy.pdf
https://etd.uum.edu.my/2946/4/Moceheb_Lazam_Shuwandy.pdf
https://etd.uum.edu.my/2946/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1833436022382264320
author Shuwandy, Moceheb Lazam
author_facet Shuwandy, Moceheb Lazam
author_sort Shuwandy, Moceheb Lazam
building UUM Library
collection Institutional Repository
content_provider Universiti Utara Malaysia
content_source UUM Electronic Theses
continent Asia
country Malaysia
description Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Department of Defense and launched in the eighties to the world. Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. It was called MOLAZ. It used two algorithms AES 128 and AES 256 bits, and switching between them using special key (K,). In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. Therefore, in 2011 appeared MOLAZ-SM. It presents a study is the development of this system by adding the mask technique to prevent the use of the style of repeated attempts to enter the key. The system depends on the base "If you enter a true key, you obtain to the truth information, but if you enter the false key; you obtains to the false information."
format Thesis
id my.uum.etd-2946
institution Universiti Utara Malaysia
language en
en
publishDate 2012
record_format eprints
spelling my.uum.etd-29462016-04-27T07:51:50Z https://etd.uum.edu.my/2946/ Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) Shuwandy, Moceheb Lazam QA76 Computer software Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Department of Defense and launched in the eighties to the world. Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. It was called MOLAZ. It used two algorithms AES 128 and AES 256 bits, and switching between them using special key (K,). In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. Therefore, in 2011 appeared MOLAZ-SM. It presents a study is the development of this system by adding the mask technique to prevent the use of the style of repeated attempts to enter the key. The system depends on the base "If you enter a true key, you obtain to the truth information, but if you enter the false key; you obtains to the false information." 2012 Thesis NonPeerReviewed text en https://etd.uum.edu.my/2946/1/Moceheb_Lazam_Shuwandy.pdf text en https://etd.uum.edu.my/2946/4/Moceheb_Lazam_Shuwandy.pdf Shuwandy, Moceheb Lazam (2012) Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM). Masters thesis, Universiti Utara Malaysia.
spellingShingle QA76 Computer software
Shuwandy, Moceheb Lazam
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_full Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_fullStr Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_full_unstemmed Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_short Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
title_sort smile mask development of cryptography performance of molaz method (molaz-sm)
topic QA76 Computer software
url https://etd.uum.edu.my/2946/1/Moceheb_Lazam_Shuwandy.pdf
https://etd.uum.edu.my/2946/4/Moceheb_Lazam_Shuwandy.pdf
https://etd.uum.edu.my/2946/
url_provider http://etd.uum.edu.my/