Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "1b82d887-cdf3-481d-94d6-46e192a080e4"}, "_deposit": {"id": "4185", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4185"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4185", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Hybrid Cryptographic System for Network Security", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of digital data in industrial process, it is essential to protect the confidential data from unauthorized access. To address these security concerns, various security protocols that are of symmetric key and asymmetric key type have been developed. In this paper, we present a software implementation of hybrid cryptographic system that combines the symmetric algorithm, Advanced Encryption Standard (AES), and the asymmetric algorithm (ElGamal). This hybrid algorithm that has been implemented also considers how to take care of the integrity of data using Secure Hash Algorithm (SHA-1). AES is used to encrypt data and thanks to its efficiency and security; it can execute at high speeds, and consume less computer resources of memory and processor time. However, AES algorithm suffers the distribution problem. ElGamal algorithm is used to encrypt AES key for key security and to solve key distribution problem."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "AES"}, {"interim": "ElGamal"}, {"interim": "Integrity"}, {"interim": "Security"}, {"interim": "SHA-1"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55335.pdf", "filesize": [{"value": "494 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 494000.0, "url": {"url": "https://meral.edu.mm/record/4185/files/55335.pdf"}, "version_id": "c620fc43-f825-461d-a7f9-4f4849780c4a"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "lai, Nan Wut Yi"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1880"}, "item_title": "Hybrid Cryptographic System for Network Security", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004185", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-06"}, "publish_date": "2019-08-06", "publish_status": "0", "recid": "4185", "relation": {}, "relation_version_is_last": true, "title": ["Hybrid Cryptographic System for Network Security"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Hybrid Cryptographic System for Network Security

http://hdl.handle.net/20.500.12678/0000004185
http://hdl.handle.net/20.500.12678/0000004185
7c8a3eee-2809-4db9-9a55-8cbdd223399b
1b82d887-cdf3-481d-94d6-46e192a080e4
None
Preview
Name / File License Actions
55335.pdf 55335.pdf (494 Kb)
Publication type
Article
Upload type
Publication
Title
Title Hybrid Cryptographic System for Network Security
Language en
Publication date 2009-12-30
Authors
lai, Nan Wut Yi
Aye, Zin May
Description
With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of digital data in industrial process, it is essential to protect the confidential data from unauthorized access. To address these security concerns, various security protocols that are of symmetric key and asymmetric key type have been developed. In this paper, we present a software implementation of hybrid cryptographic system that combines the symmetric algorithm, Advanced Encryption Standard (AES), and the asymmetric algorithm (ElGamal). This hybrid algorithm that has been implemented also considers how to take care of the integrity of data using Secure Hash Algorithm (SHA-1). AES is used to encrypt data and thanks to its efficiency and security; it can execute at high speeds, and consume less computer resources of memory and processor time. However, AES algorithm suffers the distribution problem. ElGamal algorithm is used to encrypt AES key for key security and to solve key distribution problem.
Keywords
AES, ElGamal, Integrity, Security, SHA-1
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1880
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:18:29.591349
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL