IIUM Repository

Protection of the texts using Base64 and MD5

Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (1). pp. 22-34. ISSN 2231-8852

[img]
Preview
PDF (Protection of the texts using Base64 and MD5) - Published Version
Download (904kB) | Preview

Abstract

The encryption process combines mathematics and computer science. Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. This paper discusses an encryption method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, The MD5 hash function is used to hash the encrypted file performed by Base64. As an example for the two protection mechanisms, Arabic letters are used to represent the texts. So using the two protection methods together will increase the security level for protecting the data.

Item Type: Article (Journal)
Uncontrolled Keywords: Encryption, Decryption, Base64, MD5, protection
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Professor Imad Taha
Date Deposited: 10 Apr 2012 12:01
Last Modified: 10 Apr 2012 12:01
URI: http://irep.iium.edu.my/id/eprint/22164

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year