The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment

The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment....

Full description

Saved in:
Bibliographic Details
Main Author: Hasnira, Md. Lazim
Format: Thesis
Language:eng
eng
Published: 2004
Subjects:
Online Access:https://etd.uum.edu.my/1200/1/HASNIRA_MD._LAZIM.pdf
https://etd.uum.edu.my/1200/2/1.HASNIRA_MD._LAZIM.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.1200
record_format uketd_dc
spelling my-uum-etd.12002013-07-24T12:10:53Z The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment 2004 Hasnira, Md. Lazim Sekolah Siswazah Graduate School QA76 Computer software The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. The methodology and testing procedure which are used during this evaluation is based on a simulation model. Result from the evaluation set constructed is found able to show the performance of the cryptography system. ClipSecure is rate to be the best fitted features of cryptography system in this project scope for it has choices of nine algorithms, plus a hardcore mode and support for both message and file encryption. 2004 Thesis https://etd.uum.edu.my/1200/ https://etd.uum.edu.my/1200/1/HASNIRA_MD._LAZIM.pdf application/pdf eng validuser https://etd.uum.edu.my/1200/2/1.HASNIRA_MD._LAZIM.pdf application/pdf eng public masters masters Universiti Utara Malaysia Benjamin, LaiL (2002) .Broadband Network & Device Security. Brandon A Nordin.18-21 Bradley, J. (2000). The SSLP Refeference Implementation Project. Retrieve 28 April 2004 from http://ww.cs.bris.ac.uk/~bradley/publish/SSLP/contents.html Danesh, A., Mehrassa, A & Lau, F. (2002). Safe and Secure - Your Home Network and Protect Your Privacy Online. Indiana:Sams Publishing ELSIE FOH.(2002). DBS to ensure safety, hacker incident not taken lightly. Retrieve 24 March 2004 from http: //www.sensecurity.org/dbs.htm Kangas, E. (2003). The Care For Secured Email. Retrieve 24 March 2004 from http: //www.luxsci.com/extranet/articles/email-security.html#1 Karagiannis, K (2002). Securing Your E-Mail, Retrieve 24 March 2004 from http:// www.pcmag.com/category2/0,1738,671308,00.asp Lawnham, D. (2001). Student expelled for Email Fraud Australian IT. Retrieve 10 March 2004 from http://australianit.news.com.au Miller, G. (2002). Infomation Hiding:Past, Present, Future. Retrieve 24 March 2004 from http: //www.eco.utexas.edu/faculty/Norman/BUS.FOR/course.mat/SSim/ Netscape.com. (2004). Netscape’s Tech Briefs. Retrieve 8 April 2004 from http:// home.netscape.com/security/techbriefs/index.html Noorulsadiqin Azbiya (2003). Utilizing Snort in the Analysis of Intrusion Detection System. Universiti Utara Malaysia. Rabaiotti, J. (2003). In+Implementing an RSA Crypptographt System for Windows. Retrieve 28 March 2004 from hm://www.cs.cf.ac.uk/user/Antonia.J.jones/Freeware/Encryption/JRabaiottiReport.pdf Schneier, B. (1996). Applied Cryptogtaphy: Protocols, Algorithms and Source Code in C. Second Edition. USA : John Wiley & Sons Inc Schneier, B. (1995). E-Mail Security- How to Keep Your Electronic Message Private. USA: John Wiley 8 Sons Inc Setco.org. (2004). SET Secure Electronic Transaction LLC. Retrieve 8 April 2004 from http://www.setco.org/setmark/ Singh, S (1999) The Code Book. USA: Fourth Estate Soft Alley Inc. (2003). Cryptographic Technologies-A Comparison. Retrieve 28 March 2004 from http: //ww.softalley.com/products/gargoyle/3.11/eSecure.html Splaine, S. (2002). Testing Web Security Assessing the Security of Web Sites and Application. Indiana: John Wiley & Sons Inc Stein, L.D. (1998). Web Security: A Step by Step Reference Guide. Massachussetts: Addison-Wesley. Tuban, E. & Aronson, J. E. (2001). Decision Support Systems and Intellegent Systems. New Jersey: Prentice Hall. VeriSign.com. (2004). VeriSign, int. Retrieve 8 April 2004 from http: //www.verisign.com/ Whitman, M. E. & Mattord, H. J. (2003). Principles of Information Security. Massachusetts:Thomson Course Technologies
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
topic QA76 Computer software
spellingShingle QA76 Computer software
Hasnira, Md. Lazim
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
description The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. The methodology and testing procedure which are used during this evaluation is based on a simulation model. Result from the evaluation set constructed is found able to show the performance of the cryptography system. ClipSecure is rate to be the best fitted features of cryptography system in this project scope for it has choices of nine algorithms, plus a hardcore mode and support for both message and file encryption.
format Thesis
qualification_name masters
qualification_level Master's degree
author Hasnira, Md. Lazim
author_facet Hasnira, Md. Lazim
author_sort Hasnira, Md. Lazim
title The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
title_short The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
title_full The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
title_fullStr The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
title_full_unstemmed The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
title_sort implementation of securing plaintext file using cryptography method in web based environment
granting_institution Universiti Utara Malaysia
granting_department Sekolah Siswazah
publishDate 2004
url https://etd.uum.edu.my/1200/1/HASNIRA_MD._LAZIM.pdf
https://etd.uum.edu.my/1200/2/1.HASNIRA_MD._LAZIM.pdf
_version_ 1747827094077833216