A Model for Evaluation of Cryptography Algorithm on UUM Portal

The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. The development of the simulation model consists of seven steps. The steps are problem definition,...

Full description

Saved in:
Bibliographic Details
Main Author: Norliana, Abdul Majid
Format: Thesis
Language:eng
eng
Published: 2004
Subjects:
Online Access:https://etd.uum.edu.my/1393/1/NORLIANA_ABDUL_MAJID.pdf
https://etd.uum.edu.my/1393/2/1.NORLIANA_ABDUL_MAJID.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.1393
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
topic QA Mathematics
spellingShingle QA Mathematics
Norliana, Abdul Majid
A Model for Evaluation of Cryptography Algorithm on UUM Portal
description The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. The development of the simulation model consists of seven steps. The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. The development of of simulation model involves three level of development. Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. This project concludes by discussing problems and limitations that were encountered in completing this project, and offers a few recommendations for future development in this area.
format Thesis
qualification_name masters
qualification_level Master's degree
author Norliana, Abdul Majid
author_facet Norliana, Abdul Majid
author_sort Norliana, Abdul Majid
title A Model for Evaluation of Cryptography Algorithm on UUM Portal
title_short A Model for Evaluation of Cryptography Algorithm on UUM Portal
title_full A Model for Evaluation of Cryptography Algorithm on UUM Portal
title_fullStr A Model for Evaluation of Cryptography Algorithm on UUM Portal
title_full_unstemmed A Model for Evaluation of Cryptography Algorithm on UUM Portal
title_sort model for evaluation of cryptography algorithm on uum portal
granting_institution Universiti Utara Malaysia
granting_department Faculty of Information Technology
publishDate 2004
url https://etd.uum.edu.my/1393/1/NORLIANA_ABDUL_MAJID.pdf
https://etd.uum.edu.my/1393/2/1.NORLIANA_ABDUL_MAJID.pdf
_version_ 1747827137347321856
spelling my-uum-etd.13932013-07-24T12:11:46Z A Model for Evaluation of Cryptography Algorithm on UUM Portal 2004 Norliana, Abdul Majid Faculty of Information Technology Faculty of Information Technology QA Mathematics The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. The development of the simulation model consists of seven steps. The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. The development of of simulation model involves three level of development. Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. This project concludes by discussing problems and limitations that were encountered in completing this project, and offers a few recommendations for future development in this area. 2004 Thesis https://etd.uum.edu.my/1393/ https://etd.uum.edu.my/1393/1/NORLIANA_ABDUL_MAJID.pdf application/pdf eng validuser https://etd.uum.edu.my/1393/2/1.NORLIANA_ABDUL_MAJID.pdf application/pdf eng public masters masters Universiti Utara Malaysia Bassham, L.E., (2000). Efficiency Testings ANSI implementation of Round 2 Candidate Algorithms For The Advanced Encryption Standard. Coopersmith, D., Gennaro, R., Halevi, S., Jutla, C., Matyas, S. M., Peyravian, M.,Safford, D., and Zunic, N., (2000). IBM Comments. Third AES Conference. Daemon, J., and Rijmaen, V., (2000). Rijnclael for AES. 3rd AES Conference. Dray, J., (1999). Report on The NIST Java AES Candidate Algorithm analysis. Retrieve from http://csrc.nist. go/encryption_Standard_Candidate_Conference. Dray, J.,( 2000). Report on NET Performance Analysis of The Final Round Java AES Candidates. Retrieve from http://csrc.nist.gov/encryption_Standard_Candidate_Conference Foo, S., Leong, P. C., Hui, S. C., and Liu, S., (1999) Security Consideration in The Delivery of Web-based Application: A Case Study. Information management and Computer Security 7(l),pp.40-49. Gladdman, B . , (1999). implementation Experience With AES Candidate Algorithms Second AES Conference Hazari, S., (2002). Challenges of implementing Public Key Infrastructure in Netcentric Enterprises. Logistics Information management,15(5/6), pp.385-392. Irakleous, I., Furnel, S. M., Dowland, P. S., and Papadaki, M., (2002). An Experimental Comparison of Secret-based User Authentication Technologies. Information management and Computer Security, 10(3), pp.100-108. Kamal, M. Z., and Amir, M. A. S., (2004). Password Retrieval Mechanism: An Evaluation on UUM Web Portal. Nechvatal, J., Barker, E., Bassharn, L., Burr, W., Foti, J., and Robck, E., (2000). Report on The Development of Advanced Encryption Standard (AES). Retrieved from http://www.nistg.gov/aes/ Rivest, R, . L., Robshaw, M. J. B., Sidney, R., and Yin Y. L., (1999). The RC6 Block Cipher. NIST AES proposal. Saarinen, V., (2000). Speed Versus Security. Retrieve from http://www.tml.hut.fi/Studies/Tik-110300/2000/Newtech/speed_sec_1.html. Sadeh, T., and Walker, J., (2003). Library Portal: Toward The Semantic Web. New Library world, 104(1184/1185), pp.11-19. retrieved from http://www.emeraldinsight.com/0307-4803.htm Schneier, B., (1995). E-mail Security: How to Keep Your Electronics Message Private. New York: John Wiley & Sons Inc. Schneier, B., and Whiting, D., (2000). A Performance Comparison of The Five AES Finalist. Schneier, B., Kelsey , J., Whiting, D., Hall, C., and Ferguson, N., (1999). The Twofish as an AES Candidates. Splaine , S . (2002). Testing Web Security: Assessment The Security of Key Sites and Applications. Indianapolis, Indiana: Wiley Publishing Inc. Sterbenz, A., and Lipp, P., (2000). Performance of The AES Candidates Algorithm its Jaw. Retrieve from http://csrc.nist.eov/encn.ption/aes. Turban, E . , and Aronsson, J. E., (1998). Decision Support Systems and Intelligent Systemics for international Edition. Upper Saddler River, N. J: Prentice Hall.