{"created":"2020-09-01T13:47:14.500158+00:00","id":3929,"links":{},"metadata":{"_buckets":{"deposit":"5ff7ba5a-cefd-4af6-9354-9b9516cb4b1a"},"_deposit":{"id":"3929","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3929"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3929","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of Information Security System Using Rc4 and Blowfish","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Computer security is an important field of study formost day-to-day transactions. Cryptography standards areneeded to create interoperability in the transformation securityworld. Cryptography mechanism is based on the secret key(symmetric) and public-key(asymmetric) . This paper presentsthe implementation of information security system using RC4and Blowfish and compares the performance of stream cipherand Black cipher with variable key length. It also investigatesthe performance and time consuming of RC4 and Blowfishsymmetric key algorithms. A user can encrypt and decryptseveral types of files such as text, image and sound files. Whencomparing the performance of two symmetric algorithms, RC4is faster than Blowfish."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Implementation of Information Security  System Using Rc4 and Blowfish.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3929/files/Implementation of Information Security  System Using Rc4 and Blowfish.pdf"},"version_id":"5829b97b-1c7c-48bb-b425-53ad92aa2001"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aye, Aye"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1648"},"item_title":"Implementation of Information Security System Using Rc4 and Blowfish","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3929","relation_version_is_last":true,"title":["Implementation of Information Security System Using Rc4 and Blowfish"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T03:24:34.000004+00:00"}