{"created":"2020-09-01T13:34:47.924174+00:00","id":3816,"links":{},"metadata":{"_buckets":{"deposit":"3109161d-27c1-4a95-a2db-6b56fbad79f0"},"_deposit":{"id":"3816","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3816"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3816","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Providing Data Integrity and Authentication using RSA Digital Signature and MD5 Hash Algorithm","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"This paper presents how to get data integrity and authentication in receiver. Signing process is performed in sender and verifying process is performed in receiver. In signing process, sender computes hash value of message/file. The output is unique hash value. Sender encrypts this unique hash value with sender’s private key. The output is digital signature. And then, sender sends original message/file and it’s signature to receiver. In verifying process, receiver decrypts the signature with sender’s public key. The output is unique hash value. And receiver computes hash value of original message/file. If two hash values are equal, the content of message/file is not modified after signed and was sent by valid sender. If two hash values are not equal, the content of message/file is modified after signed and was sent by invalid sender."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-31"}],"displaytype":"preview","filename":"54134.pdf","filesize":[{"value":"537 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3816/files/54134.pdf"},"version_id":"7e123852-af85-4803-964a-95e1959559a4"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Swe, Khin Thet Nwe"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1544"},"item_title":"Providing Data Integrity and Authentication using RSA Digital Signature and MD5 Hash Algorithm","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-31","publish_status":"0","recid":"3816","relation_version_is_last":true,"title":["Providing Data Integrity and Authentication using RSA Digital Signature and MD5 Hash Algorithm"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T03:57:23.262496+00:00"}