{"created":"2020-09-01T14:19:37.200903+00:00","id":4194,"links":{},"metadata":{"_buckets":{"deposit":"8a164d9c-2422-4649-adf3-70b36db70a09"},"_deposit":{"id":"4194","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4194"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4194","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Encryption and Decryption by using RC5 And DES Algorithms for Data File","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Today, it is important that information is sentconfidentially over the network without fear ofhackers or unauthorized access to it. Cryptographywas created as a technique for securing the secrecyof communication and many different methods havebeen developed to encrypt and decrypt data inorder to keep the message secret. The proposedcryptographic system is reconfigurable for thenumber of block bits and the number ofcryptographic rounds. In this system, many filestypes can encrypt and decrypt by using RC5 andDES algorithm. The secret key of DES istransformed into 16 sub keys and consequentlyDES takes 16 rounds to perform an encryption. ForRC5 algorithm, rounds key is more than 16. Butthis system uses just only 16 rounds. In this systemshows the tables and has included different time forDES and RC5."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-06"}],"displaytype":"preview","filename":"55348.pdf","filesize":[{"value":"372 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4194/files/55348.pdf"},"version_id":"bb901596-98c4-4294-a002-8de732dd5209"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Wai, Hnin Yu"},{"subitem_authors_fullname":"Nwe, Khine Myat"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1889"},"item_title":"Encryption and Decryption by using RC5 And DES Algorithms for Data File","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-06","publish_status":"0","recid":"4194","relation_version_is_last":true,"title":["Encryption and Decryption by using RC5 And DES Algorithms for Data File"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:27:18.058544+00:00"}