MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "1b82d887-cdf3-481d-94d6-46e192a080e4"}, "_deposit": {"id": "4185", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4185"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4185", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Hybrid Cryptographic System for Network Security", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of digital data in industrial process, it is essential to protect the confidential data from unauthorized access. To address these security concerns, various security protocols that are of symmetric key and asymmetric key type have been developed. In this paper, we present a software implementation of hybrid cryptographic system that combines the symmetric algorithm, Advanced Encryption Standard (AES), and the asymmetric algorithm (ElGamal). This hybrid algorithm that has been implemented also considers how to take care of the integrity of data using Secure Hash Algorithm (SHA-1). AES is used to encrypt data and thanks to its efficiency and security; it can execute at high speeds, and consume less computer resources of memory and processor time. However, AES algorithm suffers the distribution problem. ElGamal algorithm is used to encrypt AES key for key security and to solve key distribution problem."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "AES"}, {"interim": "ElGamal"}, {"interim": "Integrity"}, {"interim": "Security"}, {"interim": "SHA-1"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55335.pdf", "filesize": [{"value": "494 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 494000.0, "url": {"url": "https://meral.edu.mm/record/4185/files/55335.pdf"}, "version_id": "c620fc43-f825-461d-a7f9-4f4849780c4a"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "lai, Nan Wut Yi"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1880"}, "item_title": "Hybrid Cryptographic System for Network Security", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004185", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-06"}, "publish_date": "2019-08-06", "publish_status": "0", "recid": "4185", "relation": {}, "relation_version_is_last": true, "title": ["Hybrid Cryptographic System for Network Security"], "weko_shared_id": -1}
Hybrid Cryptographic System for Network Security
http://hdl.handle.net/20.500.12678/0000004185
http://hdl.handle.net/20.500.12678/00000041857c8a3eee-2809-4db9-9a55-8cbdd223399b
1b82d887-cdf3-481d-94d6-46e192a080e4
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Hybrid Cryptographic System for Network Security | |||||
Language | en | |||||
Publication date | 2009-12-30 | |||||
Authors | ||||||
lai, Nan Wut Yi | ||||||
Aye, Zin May | ||||||
Description | ||||||
With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of digital data in industrial process, it is essential to protect the confidential data from unauthorized access. To address these security concerns, various security protocols that are of symmetric key and asymmetric key type have been developed. In this paper, we present a software implementation of hybrid cryptographic system that combines the symmetric algorithm, Advanced Encryption Standard (AES), and the asymmetric algorithm (ElGamal). This hybrid algorithm that has been implemented also considers how to take care of the integrity of data using Secure Hash Algorithm (SHA-1). AES is used to encrypt data and thanks to its efficiency and security; it can execute at high speeds, and consume less computer resources of memory and processor time. However, AES algorithm suffers the distribution problem. ElGamal algorithm is used to encrypt AES key for key security and to solve key distribution problem. | ||||||
Keywords | ||||||
AES, ElGamal, Integrity, Security, SHA-1 | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1880 | |||||
Journal articles | ||||||
Fourth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |