{"created":"2020-09-01T13:46:55.844969+00:00","id":3921,"links":{},"metadata":{"_buckets":{"deposit":"9f8dfd08-c976-4b02-b61e-02f2414b71c8"},"_deposit":{"id":"3921","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3921"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3921","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Digital Signature using RSA and MD5 Algorithms","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Nowadays, the security of the information exchangedis very important. In this paper, MD5 is used for computing thehash value of the message and RSA is used for signing themessage and verifying the digital signature. When as senderwishes to send a signed message to a receiver , the senderrequests a certificate to the trusted Certification Authority. Thesender hashes the plaintext and signs the hashed message withsender’s private key to form a digital signature and encrypts theplaintext with receiver’s public key and sends the ciphertext andsignature . The receiver decrypts the ciphertext and hashes theplaintext with the same hash function from the signature. If theresults are exactly equal, the signature is valid and the receivercan read the message from the sender."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Digital Signature using RSA and MD5 Algorithms.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3921/files/Digital Signature using RSA and MD5 Algorithms.pdf"},"version_id":"660a6024-c68c-4250-9dc9-ea24673890c4"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Win, May Thu"},{"subitem_authors_fullname":"Myaing, Khin Lay"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1640"},"item_title":"Digital Signature using RSA and MD5 Algorithms","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3921","relation_version_is_last":true,"title":["Digital Signature using RSA and MD5 Algorithms"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:16:53.760036+00:00"}