Optimized Hybrid Security Model using Base 64 Algorithm

'Base64 Encoding Algorithm' tutorial was cited in a 'IJCSNS (International Journal of Computer Science and Network Security)' paper in 2018.

The Base64 Encoding Algorithm tutorial was cited in a "IJCSNS (International Journal of Computer Science and Network Security)" paper in 2018.

Subject: Optimized Hybrid Security Model using Base 64
   Algorithm in conjunction with Substitution Cipher
   to Enhance Text Security
Date: Mar 5, 2018
Author: Abdullah Maitlo, Rafaqat Hussain Arain, ...
Source: http://paper.ijcsns.org/07_book/201803/20180313.pdf

Summary

Social business has improved the ability of managers and stakeholders
when decision making. However, existing information security systems
provide insufficient practice for information protection while
transferring information; hackers access valuable information and break
encryption codes applied to text messages. This paper presents the
development of an Optimized Hybrid Security Model using Base 64 Algorithm
and Substitution in Conjunction to enhance message security. This
research is a prototype for the user input of message and security key in
Hypertext Preprocessor using JQuery. The developed system needs the input
of the plain text and the security key. Initially, Base 64 algorithm
encrypts plain text into cypher text with the security key and then the
Substitution Cipher encrypts the key into a cypher secured key. For
testing, 300 text messages were input with different security keys. This
research is a step forward in securing text messages; it can be used to
encrypt text between sender and receiver through email, or it can be
applied on instant messaging services and also can be used for stronger
password encryption.

...

References

...

[21] D. H. Yang, "Base64 Encoding Algorithm," Data Encodings - Herong's
Tutorial, 2010. [Online]. Available:
http://www.herongyang.com/encoding/Base64-Encoding-Algorithm.html.
[Accessed: 09-May-2012]. ...

Table of Contents

 About This Book

 Reference Citations in 2020

 Reference Citations in 2019

Reference Citations in 2018

 WSDL (วิสเด้าว์) เอกสารส่งข้อมูลของ Web Service (เว็บ เซอร์วิส)

 Properly using .bind() in React...

 XML 파일 보는 방법

 Java Code Examples for java.sql.ResultSet.getAsciiStream()

Optimized Hybrid Security Model using Base 64 Algorithm

 Locking Rows In MYSQL

 Algoritmat Kriptografike dhe Siguria

 C# (CSharp) RSAPublicKey Examples

 Google Play Games Services works...

 【CTF】SUCTF 2018 部分web writeup

 FISCO-BCOS - client.keystore Generation

 Secure Hashing Algorithm

 DARE Algorithm: A New Security Protocol

 SMA CRYPTOGRAPHY ALGORITHM DECRYPT MD5 SOLUTION

 Labeless Part 5: Decrypt Strings in Boleto Banking Malware

 Agregator internetskih radijskih postaja

 openssl 설정 pem 생성 - 프로그래밍 방식으로 SSL 인증서 확인

 security - https - java 서버가 tls 1.2 만 받아들이고

 WSDL 2.0文档示例

 Reference Citations in 2017

 Reference Citations in 2016

 Reference Citations in 2015

 Reference Citations in 2014

 Reference Citations in 2013

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003