Protection of text using SHA1 and Base64

Protection of information is a prerequisite demand in the world of computers today. Protection of information can be accomplished in different methods. The main objective of the use of the protection of information is to protect data and information in order to achieve privacy. This paper discusses...

Full description

Saved in:
Bibliographic Details
Main Authors: Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi
Format: Conference or Workshop Item
Language:English
Published: 2012
Subjects:
Online Access:http://irep.iium.edu.my/24418/1/crypto-conf-langkawi.pdf
http://irep.iium.edu.my/24418/
http://math.usm.my/cryptology2012/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.24418
record_format dspace
spelling my.iium.irep.244182012-07-24T03:58:20Z http://irep.iium.edu.my/24418/ Protection of text using SHA1 and Base64 Taha, Imad Alahmad, Mohammad Ahmad, Hanadi QA75 Electronic computers. Computer science Protection of information is a prerequisite demand in the world of computers today. Protection of information can be accomplished in different methods. The main objective of the use of the protection of information is to protect data and information in order to achieve privacy. This paper discusses two methods of protection of information, an encryption method called Base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The SHA1 hash function is used to hash the encrypted file performed by Base64. As an example of an ASCII code, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data. 2012-06-04 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/24418/1/crypto-conf-langkawi.pdf Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012, 4-6 June, 2012, Langkawi. http://math.usm.my/cryptology2012/
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Taha, Imad
Alahmad, Mohammad
Ahmad, Hanadi
Protection of text using SHA1 and Base64
description Protection of information is a prerequisite demand in the world of computers today. Protection of information can be accomplished in different methods. The main objective of the use of the protection of information is to protect data and information in order to achieve privacy. This paper discusses two methods of protection of information, an encryption method called Base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The SHA1 hash function is used to hash the encrypted file performed by Base64. As an example of an ASCII code, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data.
format Conference or Workshop Item
author Taha, Imad
Alahmad, Mohammad
Ahmad, Hanadi
author_facet Taha, Imad
Alahmad, Mohammad
Ahmad, Hanadi
author_sort Taha, Imad
title Protection of text using SHA1 and Base64
title_short Protection of text using SHA1 and Base64
title_full Protection of text using SHA1 and Base64
title_fullStr Protection of text using SHA1 and Base64
title_full_unstemmed Protection of text using SHA1 and Base64
title_sort protection of text using sha1 and base64
publishDate 2012
url http://irep.iium.edu.my/24418/1/crypto-conf-langkawi.pdf
http://irep.iium.edu.my/24418/
http://math.usm.my/cryptology2012/
_version_ 1643608744547844096
score 13.160551