咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Security Framework for Distrib... 收藏

Security Framework for Distributed Database System

Security Framework for Distributed Database System

作     者:Allajabu Dafalla Khamis Saad Subair 

作者机构:College of Computer and Information Science Faculty of Graduate Studies Alzaem Alazhari University Khartoum Sudan College of Computer Studies International University of Africa Khartoum Sudan 

出 版 物:《Journal of Data Analysis and Information Processing》 (数据分析和信息处理(英文))

年 卷 期:2019年第7卷第1期

页      面:1-13页

学科分类:1002[医学-临床医学] 100214[医学-肿瘤学] 10[医学] 

主  题:Cryptography Encryption Decryption Time Duration AES DES 3DES Rijndael RC2 

摘      要:This research aims to study various Symmetrical Algorithms, while the main objective of this study is to find out a suitable algorithm for the encryption of any specific size of text file where the experiment of each algorithm is based on encryption of different sizes of the text files, which are in “10 KB to 5 MB, and also to calculate the time duration that each algorithm takes to encrypt or to decrypt the particular size of each text file. There are many types of encryption algorithm, which can be used to encrypt the computerized information in different Organizations, whose all algorithms can encrypt and decrypt any size of text file, but the time duration of each Algorithm during the encryption or decryption process of specific file size is not fixed. Some of the algorithms are suitable for encryption of specific ranges of the file size, or some of algorithms are functional while encryption small size of files, and others algorithms are functional for encryption of big size of text files, based on the time duration disparity among symmetric algorithms during encryption of text files. In this study five symmetrical algorithms are merged in one program using classes and concept of inheritance in the form that if encryption is needed, the program will select the file and it checks the size of the text file. After this process the program automatically will select the suitable encryption algorithm to encrypt the specific text file according to the range of the file size. Knowing that the file size before or after encryption will not change or is stable, in this case of the decryption algorithm will apply the same process of encryption while decrypting files, the program of encryption and decryption code will write using visual Studio 2013. The result will be analyzed with R program (R software), the cipher text will appear in the format of UTF8 which means Unicode Transformation Format, “8 Means “8 bits to represent a character, the size format that will apply i

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分