MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "5ff7ba5a-cefd-4af6-9354-9b9516cb4b1a"}, "_deposit": {"id": "3929", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3929"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3929", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Information Security System Using Rc4 and Blowfish", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Computer security is an important field of study formost day-to-day transactions. Cryptography standards areneeded to create interoperability in the transformation securityworld. Cryptography mechanism is based on the secret key(symmetric) and public-key(asymmetric) . This paper presentsthe implementation of information security system using RC4and Blowfish and compares the performance of stream cipherand Black cipher with variable key length. It also investigatesthe performance and time consuming of RC4 and Blowfishsymmetric key algorithms. A user can encrypt and decryptseveral types of files such as text, image and sound files. Whencomparing the performance of two symmetric algorithms, RC4is faster than Blowfish."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-02"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Implementation of Information Security System Using Rc4 and Blowfish.pdf", "filesize": [{"value": "10 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 10000.0, "url": {"url": "https://meral.edu.mm/record/3929/files/Implementation of Information Security System Using Rc4 and Blowfish.pdf"}, "version_id": "5829b97b-1c7c-48bb-b425-53ad92aa2001"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Third Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aye, Aye"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-08-03"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1648"}, "item_title": "Implementation of Information Security System Using Rc4 and Blowfish", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003929", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-02"}, "publish_date": "2019-08-02", "publish_status": "0", "recid": "3929", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Information Security System Using Rc4 and Blowfish"], "weko_shared_id": -1}
Implementation of Information Security System Using Rc4 and Blowfish
http://hdl.handle.net/20.500.12678/0000003929
http://hdl.handle.net/20.500.12678/0000003929fb4be3de-3389-47c7-bcb5-12eb507b71dd
5ff7ba5a-cefd-4af6-9354-9b9516cb4b1a
Name / File | License | Actions |
---|---|---|
Implementation of Information Security System Using Rc4 and Blowfish.pdf (10 Kb)
|
|