Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "8df9a51d-dfab-4493-b6dc-01789f4928ef"}, "_deposit": {"id": "3968", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3968"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3968", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "MISTY1 Encryption /Decryption System with ELGamal Key Distribution", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Data communication is an important aspect of our living and protection from data misuse is important. The main security concerns of applications are addressed by cryptography. Cryptographic techniques are extremely critical to the development and use of defense information systems and communication networks. In the distributed environment, encryption is needed for authentication and guarding the secrecy of data in transit. This system presents the encryption of the data types such as text files and images of different formats. This system includes the two encryption and decryption components; MISTY1 symmetric algorithm and ELGamal key distribution .Input file is encrypted with MISTY1 symmetric key and that key is encrypted again with ELGamal asymmetric key for security performance. Cipher text has to be decrypted to recover the original files. Sender needs to perform file and key encryption whereas receiver key and file decryption ."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "encryption"}, {"interim": "decryption"}, {"interim": "MISTY1"}, {"interim": "ElGamal"}, {"interim": "public-key"}, {"interim": "private-key"}, {"interim": "symmetric"}, {"interim": "asymmetric"}, {"interim": "hybrid"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Cho, Theingi"}, {"subitem_authors_fullname": "khaing, Thiri Thitsar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1683"}, "item_title": "MISTY1 Encryption /Decryption System with ELGamal Key Distribution", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003968", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-03"}, "publish_date": "2019-08-03", "publish_status": "0", "recid": "3968", "relation": {}, "relation_version_is_last": true, "title": ["MISTY1 Encryption /Decryption System with ELGamal Key Distribution"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

MISTY1 Encryption /Decryption System with ELGamal Key Distribution

http://hdl.handle.net/20.500.12678/0000003968
http://hdl.handle.net/20.500.12678/0000003968
76d83436-96c6-446e-8163-2f74d93be6bc
8df9a51d-dfab-4493-b6dc-01789f4928ef
Publication type
Article
Upload type
Publication
Title
Title MISTY1 Encryption /Decryption System with ELGamal Key Distribution
Language en
Publication date 2009-12-30
Authors
Cho, Theingi
khaing, Thiri Thitsar
Description
Data communication is an important aspect of our living and protection from data misuse is important. The main security concerns of applications are addressed by cryptography. Cryptographic techniques are extremely critical to the development and use of defense information systems and communication networks. In the distributed environment, encryption is needed for authentication and guarding the secrecy of data in transit. This system presents the encryption of the data types such as text files and images of different formats. This system includes the two encryption and decryption components; MISTY1 symmetric algorithm and ELGamal key distribution .Input file is encrypted with MISTY1 symmetric key and that key is encrypted again with ELGamal asymmetric key for security performance. Cipher text has to be decrypted to recover the original files. Sender needs to perform file and key encryption whereas receiver key and file decryption .
Keywords
encryption, decryption, MISTY1, ElGamal, public-key, private-key, symmetric, asymmetric, hybrid
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1683
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:49:29.320624
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL