首页    期刊浏览 2024年11月25日 星期一
登录注册

文章基本信息

  • 标题:Smile Mask to Capsulation MOLAZ Method
  • 本地全文:下载
  • 作者:Moceheb Lazam Shuwandy
  • 期刊名称:International Journal of Computer Science and Network Security
  • 印刷版ISSN:1738-7906
  • 出版年度:2013
  • 卷号:13
  • 期号:12
  • 页码:66-70
  • 出版社:International Journal of Computer Science and Network Security
  • 摘要:Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Department of Defense and launched in the eighties to the world. Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. In the end of 2010, the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. It was called MOLAZ. It used two algorithms AES 128 and AES 256 bits, and switching between them using special key (Ks). In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. Therefore, in 2011 appeared MOLAZ-SM. It presents a study is the development of this system by adding the mask technique to prevent the use of the style of repeated attempts to enter the key. The system depends on the base ��If you enter a true key, you obtain to the truth information, but if you enter the false key you obtains to the false information.��
  • 关键词:Switching; AES-128; AES-256; MOLAZ; MOLAZ-SM
国家哲学社会科学文献中心版权所有