Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "704728eb-2b79-400f-8301-7ed4a19b9bdf"}, "_deposit": {"id": "3766", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3766"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3766", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Performance Comparison with Symmetric key Cryptography", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Today Cryptanalysis is used to secure dada for transmission over open networks such as the internet. The symmetric key is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. Symmetric key cryptography, also called secret key cryptography is a method that uses the same key for encryption of plaintext to generate the cipher text and decryption of the cipher text to get the original plaintext. In this system, performance of comparison with symmetric key cryptography is presented along the algorithm of AES (Advance Encryption Standard) and RC4 (Ron’s Code4). AES and RC4 used the block, stream cipher method for encryption and decryption of file such as text file, word file, image file and media file. This paper compares the performance of stream cipher and block cipher with variable keys length and time."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-31"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "54076.pdf", "filesize": [{"value": "542 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 542000.0, "url": {"url": "https://meral.edu.mm/record/3766/files/54076.pdf"}, "version_id": "ee4ec0ec-6f77-4192-88d2-c1cc7e5e7b59"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Win, Kyaw San"}, {"subitem_authors_fullname": "Kyu, Khin Kyu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://ucsy.edu.mm/onlineresource/handle/123456789/1499"}, "item_title": "Performance Comparison with Symmetric key Cryptography", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "https://meral.edu.mm/records/3766", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-31"}, "publish_date": "2019-07-31", "publish_status": "0", "recid": "3766", "relation": {}, "relation_version_is_last": true, "title": ["Performance Comparison with Symmetric key Cryptography"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Performance Comparison with Symmetric key Cryptography

https://meral.edu.mm/records/3766
https://meral.edu.mm/records/3766
3305e45f-1996-42a1-bae6-8b2661c2bd39
704728eb-2b79-400f-8301-7ed4a19b9bdf
None
Preview
Name / File License Actions
54076.pdf 54076.pdf (542 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:28:23.896174
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL