MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "8df9a51d-dfab-4493-b6dc-01789f4928ef"}, "_deposit": {"id": "3968", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3968"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3968", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "MISTY1 Encryption /Decryption System with ELGamal Key Distribution", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Data communication is an important aspect of our living and protection from data misuse is important. The main security concerns of applications are addressed by cryptography. Cryptographic techniques are extremely critical to the development and use of defense information systems and communication networks. In the distributed environment, encryption is needed for authentication and guarding the secrecy of data in transit. This system presents the encryption of the data types such as text files and images of different formats. This system includes the two encryption and decryption components; MISTY1 symmetric algorithm and ELGamal key distribution .Input file is encrypted with MISTY1 symmetric key and that key is encrypted again with ELGamal asymmetric key for security performance. Cipher text has to be decrypted to recover the original files. Sender needs to perform file and key encryption whereas receiver key and file decryption ."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "encryption"}, {"interim": "decryption"}, {"interim": "MISTY1"}, {"interim": "ElGamal"}, {"interim": "public-key"}, {"interim": "private-key"}, {"interim": "symmetric"}, {"interim": "asymmetric"}, {"interim": "hybrid"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Cho, Theingi"}, {"subitem_authors_fullname": "khaing, Thiri Thitsar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1683"}, "item_title": "MISTY1 Encryption /Decryption System with ELGamal Key Distribution", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003968", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-03"}, "publish_date": "2019-08-03", "publish_status": "0", "recid": "3968", "relation": {}, "relation_version_is_last": true, "title": ["MISTY1 Encryption /Decryption System with ELGamal Key Distribution"], "weko_shared_id": -1}
MISTY1 Encryption /Decryption System with ELGamal Key Distribution
http://hdl.handle.net/20.500.12678/0000003968
http://hdl.handle.net/20.500.12678/000000396876d83436-96c6-446e-8163-2f74d93be6bc
8df9a51d-dfab-4493-b6dc-01789f4928ef
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | MISTY1 Encryption /Decryption System with ELGamal Key Distribution | |||||
Language | en | |||||
Publication date | 2009-12-30 | |||||
Authors | ||||||
Cho, Theingi | ||||||
khaing, Thiri Thitsar | ||||||
Description | ||||||
Data communication is an important aspect of our living and protection from data misuse is important. The main security concerns of applications are addressed by cryptography. Cryptographic techniques are extremely critical to the development and use of defense information systems and communication networks. In the distributed environment, encryption is needed for authentication and guarding the secrecy of data in transit. This system presents the encryption of the data types such as text files and images of different formats. This system includes the two encryption and decryption components; MISTY1 symmetric algorithm and ELGamal key distribution .Input file is encrypted with MISTY1 symmetric key and that key is encrypted again with ELGamal asymmetric key for security performance. Cipher text has to be decrypted to recover the original files. Sender needs to perform file and key encryption whereas receiver key and file decryption . | ||||||
Keywords | ||||||
encryption, decryption, MISTY1, ElGamal, public-key, private-key, symmetric, asymmetric, hybrid | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1683 | |||||
Journal articles | ||||||
Fourth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |