Zakari A U Y O Abdullahi (original) (raw)

Uploads

Papers by Zakari A U Y O Abdullahi

Research paper thumbnail of CHAPTER 2 LITRETURE REVIEW THE AES CIPHER

The Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The A... more The Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The AES-128 Algorithm includes the following functions i.e. 128-bit key size, Automatic Round key calculation and Encryption or decryption functions. In this paper, we design the 128 bit AES algorithm in encryption and decryption process. We conduct a fault attack against the unprotected AES by using VHDL code.

Research paper thumbnail of Encryption and Decryption Base On

Research paper thumbnail of Bacground of the study

Encryption and Decryption, a type of cryptography, refers to the process of scrambling informatio... more Encryption and Decryption, a type of cryptography, refers to the process of scrambling information so that the observer cannot be detecting the data.Cryptographic key is a piece of data used to encrypt or decrypt to plaintext. (Alex Brennen V., 2004) The Crypto, from the word cryptographic mean is it has its origins in the Greek word KRUOTOS, which means hidden. Thus the objective of cryptography is to hide information so that only the intended recipient can read it. Cryptographic is a protocol or method of performing encryption and decryption (Alex Brennen V., 2004). There are two types of cryptographic: symmetric and asymmetric key. .1 is example a symmetric cryptographic has a single key, which is used for both encrypting and decrypting information. Data Encryption and Decryption is a well-known example of symmetric cryptographic. In symmetric cryptographic, public-key cryptographic uses complementary pair of keys to divided the process of encryption and decryption.

Research paper thumbnail of Nature and Management of Solid Waste in Karu Nasarawa State, Nigeria

Solid waste management is a major problem that has reached alarming proportions requiring drastic... more Solid waste management is a major problem that has reached alarming proportions requiring drastic measures. The increasing difficultyin managing wastes in Nigeria has become one of the most intractable environmental issues. There is unprecedented increase in the volume of waste generated by urban residents; changes in the quality of waste composition and the disposal methods are not improved upon. The cardinal objective of the study is to examine the nature and management of solid waste in Karu, Nasarawa State, Nigeria. Both primary and secondary sources of data collectionwere adopted. A field survey was undertaken to determine the types, volume, composition and methods of managing solid waste in Karu urban areas. The volume of waste was measured from three selected households in the four residential areas namely Mararaba, Masaka, Ado and New Karu. Two hundred and thirty (230) sampleswere selected using combined systematic, randomization and stratified sampling techniques among the households as well as the staff of the municipal waste management agency. The study employed descriptive statistics to analyse the data. The analysis indicates that solid wastes are generated from households in Mararba (28.8%),Masaka (22.9%), New Karu (25.7%), and Ado (22.6%)in that order. The methods of solid waste disposal range from direct dumping (43.6%), open burning (23.0%), dust bins (32.4%), composting and dumping in drains accounted for (1.0%) in the study area.On the basis of the results, it was recommended among other things that government should provide basic facilities;equipment, adequate funds,and qualified personnel to manage the various wastes generated and increase public awareness through enlightenment campaign against the danger of indiscriminate dumping of wastes as they affect human health. Moreover, appropriate policy should be put in place to encourage partnership with private individual corporations with a bid to ensuring quality of the environment.

Thesis Chapters by Zakari A U Y O Abdullahi

Research paper thumbnail of CHAPTER 2 LITRETURE REVIEW THE AES CIPHER

The Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The A... more The Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The AES-128 Algorithm includes the following functions i.e. 128-bit key size, Automatic Round key calculation and Encryption or decryption functions. In this paper, we design the 128 bit AES algorithm in encryption and decryption process. We conduct a fault attack against the unprotected AES by using VHDL code. AES is a symmetric block cipher, Like DES. This means that it uses the same key for both encryption and decryption. However, AES is quite different from DES in a number of ways. The algorithm Rijndael allows for a variety of block and key sizes and not just the 64 and 56 bits of DES' block and key size. The block and key can in fact be chosen independently from 128, 160, 192, 224, 256 bits i.e different AES algorithm. and need not be the same. However, the AES standard states that the algorithm can only accept a block size of 128 bits and a choice of three keys-128, 192, 256 bits. Depending on which version is used, the name of the standard is modified to AES-128, AES-192 or AES-256 respectively. As well as these differences AES differs from DES in that it is not a feistel structure. (Ms.Ruchi R. Vairagade,2014)

Research paper thumbnail of Bacground of the study

Encryption and Decryption, a type of cryptography, refers to the process of scrambling informatio... more Encryption and Decryption, a type of cryptography, refers to the process of scrambling information so that the observer cannot be detecting the data.Cryptographic key is a piece of data used to encrypt or decrypt to plaintext. (Alex Brennen V., 2004) The Crypto, from the word cryptographic mean is it has its origins in the Greek word KRUOTOS, which means hidden. Thus the objective of cryptography is to hide information so that only the intended recipient can read it. Cryptographic is a protocol or method of performing encryption and decryption (Alex Brennen V., 2004). There are two types of cryptographic: symmetric and asymmetric key. Figure 1.1 is example a symmetric cryptographic has a single key, which is used for both encrypting and decrypting information. Data Encryption and Decryption is a well-known example of symmetric cryptographic. In symmetric cryptographic, public-key cryptographic uses complementary pair of keys to divided the process of encryption and decryption.

Research paper thumbnail of Encryption and Decryption based on message from one device to another

Bayero University kano project, Faculty of computer Science and information technology, Departmen... more Bayero University kano project,
Faculty of computer Science and information technology,
Department of computer science
This cipher is on double encryption of messages from one device to another.Two most powerful ciphers are used,(sha1, and AES) encryption.
The idea is that if a user have a message and key what the program will do is that, it will encrypted the key using sha-1 and used the encrypted key to encrypt the message.
Precisely, even the message is hijack on the network as it is going to its destination, and luckily the hijacker is able to identify the cipber he will not be able to know that it is encrypted with another cipher .
The remaining chapters will be posted after it has been finished

Research paper thumbnail of CHAPTER 2 LITRETURE REVIEW THE AES CIPHER

The Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The A... more The Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The AES-128 Algorithm includes the following functions i.e. 128-bit key size, Automatic Round key calculation and Encryption or decryption functions. In this paper, we design the 128 bit AES algorithm in encryption and decryption process. We conduct a fault attack against the unprotected AES by using VHDL code.

Research paper thumbnail of Encryption and Decryption Base On

Research paper thumbnail of Bacground of the study

Encryption and Decryption, a type of cryptography, refers to the process of scrambling informatio... more Encryption and Decryption, a type of cryptography, refers to the process of scrambling information so that the observer cannot be detecting the data.Cryptographic key is a piece of data used to encrypt or decrypt to plaintext. (Alex Brennen V., 2004) The Crypto, from the word cryptographic mean is it has its origins in the Greek word KRUOTOS, which means hidden. Thus the objective of cryptography is to hide information so that only the intended recipient can read it. Cryptographic is a protocol or method of performing encryption and decryption (Alex Brennen V., 2004). There are two types of cryptographic: symmetric and asymmetric key. .1 is example a symmetric cryptographic has a single key, which is used for both encrypting and decrypting information. Data Encryption and Decryption is a well-known example of symmetric cryptographic. In symmetric cryptographic, public-key cryptographic uses complementary pair of keys to divided the process of encryption and decryption.

Research paper thumbnail of Nature and Management of Solid Waste in Karu Nasarawa State, Nigeria

Solid waste management is a major problem that has reached alarming proportions requiring drastic... more Solid waste management is a major problem that has reached alarming proportions requiring drastic measures. The increasing difficultyin managing wastes in Nigeria has become one of the most intractable environmental issues. There is unprecedented increase in the volume of waste generated by urban residents; changes in the quality of waste composition and the disposal methods are not improved upon. The cardinal objective of the study is to examine the nature and management of solid waste in Karu, Nasarawa State, Nigeria. Both primary and secondary sources of data collectionwere adopted. A field survey was undertaken to determine the types, volume, composition and methods of managing solid waste in Karu urban areas. The volume of waste was measured from three selected households in the four residential areas namely Mararaba, Masaka, Ado and New Karu. Two hundred and thirty (230) sampleswere selected using combined systematic, randomization and stratified sampling techniques among the households as well as the staff of the municipal waste management agency. The study employed descriptive statistics to analyse the data. The analysis indicates that solid wastes are generated from households in Mararba (28.8%),Masaka (22.9%), New Karu (25.7%), and Ado (22.6%)in that order. The methods of solid waste disposal range from direct dumping (43.6%), open burning (23.0%), dust bins (32.4%), composting and dumping in drains accounted for (1.0%) in the study area.On the basis of the results, it was recommended among other things that government should provide basic facilities;equipment, adequate funds,and qualified personnel to manage the various wastes generated and increase public awareness through enlightenment campaign against the danger of indiscriminate dumping of wastes as they affect human health. Moreover, appropriate policy should be put in place to encourage partnership with private individual corporations with a bid to ensuring quality of the environment.

Research paper thumbnail of CHAPTER 2 LITRETURE REVIEW THE AES CIPHER

The Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The A... more The Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The AES-128 Algorithm includes the following functions i.e. 128-bit key size, Automatic Round key calculation and Encryption or decryption functions. In this paper, we design the 128 bit AES algorithm in encryption and decryption process. We conduct a fault attack against the unprotected AES by using VHDL code. AES is a symmetric block cipher, Like DES. This means that it uses the same key for both encryption and decryption. However, AES is quite different from DES in a number of ways. The algorithm Rijndael allows for a variety of block and key sizes and not just the 64 and 56 bits of DES' block and key size. The block and key can in fact be chosen independently from 128, 160, 192, 224, 256 bits i.e different AES algorithm. and need not be the same. However, the AES standard states that the algorithm can only accept a block size of 128 bits and a choice of three keys-128, 192, 256 bits. Depending on which version is used, the name of the standard is modified to AES-128, AES-192 or AES-256 respectively. As well as these differences AES differs from DES in that it is not a feistel structure. (Ms.Ruchi R. Vairagade,2014)

Research paper thumbnail of Bacground of the study

Encryption and Decryption, a type of cryptography, refers to the process of scrambling informatio... more Encryption and Decryption, a type of cryptography, refers to the process of scrambling information so that the observer cannot be detecting the data.Cryptographic key is a piece of data used to encrypt or decrypt to plaintext. (Alex Brennen V., 2004) The Crypto, from the word cryptographic mean is it has its origins in the Greek word KRUOTOS, which means hidden. Thus the objective of cryptography is to hide information so that only the intended recipient can read it. Cryptographic is a protocol or method of performing encryption and decryption (Alex Brennen V., 2004). There are two types of cryptographic: symmetric and asymmetric key. Figure 1.1 is example a symmetric cryptographic has a single key, which is used for both encrypting and decrypting information. Data Encryption and Decryption is a well-known example of symmetric cryptographic. In symmetric cryptographic, public-key cryptographic uses complementary pair of keys to divided the process of encryption and decryption.

Research paper thumbnail of Encryption and Decryption based on message from one device to another

Bayero University kano project, Faculty of computer Science and information technology, Departmen... more Bayero University kano project,
Faculty of computer Science and information technology,
Department of computer science
This cipher is on double encryption of messages from one device to another.Two most powerful ciphers are used,(sha1, and AES) encryption.
The idea is that if a user have a message and key what the program will do is that, it will encrypted the key using sha-1 and used the encrypted key to encrypt the message.
Precisely, even the message is hijack on the network as it is going to its destination, and luckily the hijacker is able to identify the cipber he will not be able to know that it is encrypted with another cipher .
The remaining chapters will be posted after it has been finished