{"created":"2020-09-01T13:37:47.660656+00:00","id":3837,"links":{},"metadata":{"_buckets":{"deposit":"02bc8de5-1383-4893-9c93-f7adc2e2fb69"},"_deposit":{"id":"3837","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3837"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3837","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation and Comparison of Symmetric Key Crypto System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"In the world of today, computer and Internet have become part of our everyday lives. Security for data and information are very important. Secure communication is an intrinsic requirement for many popular online transactions such as e-commerce, stock trading and banking. These transactions employ a combination of public-key and symmetric key cryptography to authenticate participants and guarantee the integrity and confidentiality of information in transit. Data confidentiality and authentication are normally provided using cryptographic techniques. Cryptography is either based on symmetric keys or asymmetric keys. This system intends to analyze and implement the most popular symmetric cryptographic algorithms Data Encryption Standard, Advanced Encryption Standard, International Data Encryption Algorithm and RC4. Based on implementation and study, runtime comparison between the symmetric cryptosystems has been made."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-31"}],"displaytype":"preview","filename":"54156.pdf","filesize":[{"value":"353 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3837/files/54156.pdf"},"version_id":"64bd210a-06c3-4e66-bab4-c9bcb4b58366"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Zar, Aung Yar"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1563"},"item_title":"Implementation and Comparison of Symmetric Key Crypto System","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-31","publish_status":"0","recid":"3837","relation_version_is_last":true,"title":["Implementation and Comparison of Symmetric Key Crypto System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:48:40.275150+00:00"}