{"created":"2020-09-01T13:28:19.374701+00:00","id":3766,"links":{},"metadata":{"_buckets":{"deposit":"704728eb-2b79-400f-8301-7ed4a19b9bdf"},"_deposit":{"id":"3766","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3766"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3766","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Performance Comparison with Symmetric key Cryptography","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Today Cryptanalysis is used to secure dada for transmission over open networks such as the internet. The symmetric key is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. Symmetric key cryptography, also called secret key cryptography is a method that uses the same key for encryption of plaintext to generate the cipher text and decryption of the cipher text to get the original plaintext. In this system, performance of comparison with symmetric key cryptography is presented along the algorithm of AES (Advance Encryption Standard) and RC4 (Ron’s Code4). AES and RC4 used the block, stream cipher method for encryption and decryption of file such as text file, word file, image file and media file. This paper compares the performance of stream cipher and block cipher with variable keys length and time."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-31"}],"displaytype":"preview","filename":"54076.pdf","filesize":[{"value":"542 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3766/files/54076.pdf"},"version_id":"ee4ec0ec-6f77-4192-88d2-c1cc7e5e7b59"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Win, Kyaw San"},{"subitem_authors_fullname":"Kyu, Khin Kyu"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://ucsy.edu.mm/onlineresource/handle/123456789/1499"},"item_title":"Performance Comparison with Symmetric key Cryptography","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-31","publish_status":"0","recid":"3766","relation_version_is_last":true,"title":["Performance Comparison with Symmetric key Cryptography"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:00:04.187796+00:00"}