Font Size: a A A

Research On A Normal File Encryption And Decryption

Posted on:2010-10-06Degree:MasterType:Thesis
Country:ChinaCandidate:Harouna AboubacarFull Text:PDF
GTID:2178360275982486Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The advent of information technology (internet) some decades ago has brought about many changes in the way information is being disseminated and exchanged between people, between nations and as well in the whole world. Long ago, the issue of information "theft" has evolved worldwide and concerns about how to remediate it are getting the attention of experts in the area of Information Security. Today, with the current proliferation of some newly invented methods in cryptanalysis it is obvious that information security is the panacea.In this paper we present a review of papers which deal about information security with a fundamental aim of curing the issue of safety of information storing in files or other means of storage. Hence the idea of the Research on a Normal File Encryption and Decryption using AES and MD5.As a matter of fact our paper focuses on the entire procedure or process of how a file of any kind is encrypted and decrypted through the use of the application presented in this work.In the process of describing the file encryption procedure, we used a HHEA algorithm to demonstrate the different steps of how to encrypt a message "hi". The entire process consists of the definition of a random vector (V) to the generation of a key which will be initialized later.Results about the encryption have shown that the method used is reliable because of the strength of the algorithm enables a safe and protected message when the key is delivered to the intended receiver.Throughout this research work emphasis on three reviewed papers and algorithms enable us first to highlight the elaboration of Hybrid Hiding Encryption Algorithm HHEA then second to examine the strength of MD5 and AES out of DES and 3DES ciphers via the performance comparison in the implementation of the Cryptonite and lastly to present the integrated design of AES based on an architecture which is suited for hardware-critical applications, such as smart card, PDA, and mobile phone etc.For our research work, the strategy used is to apply the encryption methods of the AES and MD5 following some steps in the encryption process in order to produce an outcome of file that will as a result be hashed and strongly decrypted through the software. The most important aspect of our application is the intervention of those elements in the process of the encryption to produce an interwoven hashed result which can escape the tricks of malicious operations by eavesdroppers.Results of the encryption have shown that the software can provide a large scale of file encryption since binary, text and any other file type can be encrypted successfully.
Keywords/Search Tags:File encryption, Advanced Encryption Standard (AES), Message Digest Five (MD5)
PDF Full Text Request
Related items