JAINTIN, MAXDINO @ MCDINO (2005) Pembangunan Algoritma Ultraciphercrypto Bagi Penyulitan Fail. Other thesis, Universiti Teknologi Malaysia.
Download (825Kb) | Preview
The advance of the computer and information system has brought lots of success to the government and companies and most of them are activities that run through the Internet services. But we have to be alert that those activities are bare to many treats especially from the hackers. One of the reasons that brought this success is the security level setup to the system or any application. As a result, it has build up the users trust and satisfaction to their services. However, these fields are become larger from time to time and the hackers are keeping on enhancing their hacking tools. In this case, higher security level is required. Hence, the techniques, methods and cryptography algorithms of computer security have to be renewed from time to time. Any security application or system is relying on the toughness and compatibility of its cryptography system including its techniques, methods and algorithms. For example, the file encryption application must be powered by a compatible cryptography algorithm which considers the types of data, the application constraints and many more so that it will not burden the application itself and cover every single basic needs of the application.
|Item Type:||Thesis (Other)|
|Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
|Divisions:||Faculty of Computer Science and Information System > Computer Systems and Communication|
|Depositing User:||Unnamed user with email email@example.com|
|Date Deposited:||04 Jul 2013 07:02|
|Last Modified:||04 Jul 2013 07:02|
Actions (login required)