Abstract

The advent of information technology (internet) some decades ago has brought about many changes in the way information is being disseminated and exchanged between people, between nations and as well in the whole world. Long ago, the issue of information theft has evolved worldwide and concerns about how to remediate it are getting the attention of experts in the area of Information Security. Today, with the current proliferation of some newly invented methods in cryptanalysis it is obvious that information security is the panacea. In this paper, our strategy used is to apply the encryption methods of the AES and MD5 following some steps in the encryption process in order to produce an outcome of file that will as a result be hashed and strongly decrypted through the robust software for file storing. The most important aspect of our application is the intervention of those elements in the process of the encryption to produce an interwoven hashed result which can escape the tricks of malicious operations by eavesdroppers. Results of the encryption have shown that the software can provide a large scale of file encryption since binary, text and any other file type can be encrypted successfully.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.