MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "4a6b1723-d9f6-43ab-84a8-d0ecfc60e071"}, "_deposit": {"id": "3967", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3967"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3967", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Encryption Measurement and Security of Images with RC5 and RC6 Algorithm", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Todays, computers security is needed toprotect data and to thwart the hackers.Cryptanalysis on symmetric key cryptography isencouraging the use of larger key sizes and complexalgorithms to achieve an unbreakable state. To makeencryption process, symmetric key cryptography thatuses the same key for encryption of plain image alsogenerates cipher image. Decryption of the cipherimage to get the original plain image is done bydecryption. This method is used to secure data fortransmission over open networks such as theinternet. In this system, comparison of executiontimes for symmetric key cryptography is presentedalong with the algorithm of RC5 and RC6 .These aresuitable to build a secure system in the militaryenvironment, video communication and so on."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Symmetric Key"}, {"interim": "RC5"}, {"interim": "RC6"}, {"interim": "encryption"}, {"interim": "decryption"}, {"interim": "transformation"}, {"interim": "Image processing"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khaing, Ei Ei"}, {"subitem_authors_fullname": "Khaing, Thiri Thitsar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1682"}, "item_title": "Encryption Measurement and Security of Images with RC5 and RC6 Algorithm", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003967", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-03"}, "publish_date": "2019-08-03", "publish_status": "0", "recid": "3967", "relation": {}, "relation_version_is_last": true, "title": ["Encryption Measurement and Security of Images with RC5 and RC6 Algorithm"], "weko_shared_id": -1}
Encryption Measurement and Security of Images with RC5 and RC6 Algorithm
http://hdl.handle.net/20.500.12678/0000003967
http://hdl.handle.net/20.500.12678/0000003967f768c8b9-8938-4c1c-b700-88c408bfa51f
4a6b1723-d9f6-43ab-84a8-d0ecfc60e071
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Encryption Measurement and Security of Images with RC5 and RC6 Algorithm | |||||
Language | en | |||||
Publication date | 2009-12-30 | |||||
Authors | ||||||
Khaing, Ei Ei | ||||||
Khaing, Thiri Thitsar | ||||||
Description | ||||||
Todays, computers security is needed toprotect data and to thwart the hackers.Cryptanalysis on symmetric key cryptography isencouraging the use of larger key sizes and complexalgorithms to achieve an unbreakable state. To makeencryption process, symmetric key cryptography thatuses the same key for encryption of plain image alsogenerates cipher image. Decryption of the cipherimage to get the original plain image is done bydecryption. This method is used to secure data fortransmission over open networks such as theinternet. In this system, comparison of executiontimes for symmetric key cryptography is presentedalong with the algorithm of RC5 and RC6 .These aresuitable to build a secure system in the militaryenvironment, video communication and so on. | ||||||
Keywords | ||||||
Symmetric Key, RC5, RC6, encryption, decryption, transformation, Image processing | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1682 | |||||
Journal articles | ||||||
Fourth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |