{"created":"2020-09-01T15:06:31.973245+00:00","id":4568,"links":{},"metadata":{"_buckets":{"deposit":"54ca0e4f-dd5d-4ece-a911-895d3c456b55"},"_deposit":{"id":"4568","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4568"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4568","sets":["1582963302567:1597824227696"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher)","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Fast progression of digital data exchange inelectronic way, information security is becoming much moreimportant in data storage and transmission on publiccommunication networks. Cryptography has come up as asolution which plays a vital role in information security systemagainst malicious attacks. In cryptography, there are variouscipher techniques such as monoalphabetic cipher,polyalphabetic cipher, etc. to support data confidentiality assecurity mechanisms. They are methods of encrypting plain textmessage into cipher text protecting it from adversaries. Theprocess of encryption of alphabets is the converting originalmessage into non readable form. One of the most popular ciphertechniques is the Vigenère cipher. It is a polyalphabetic ciphertechnique which uses the Vigenère table for the process ofencryption of alphabets. As the Vigenère cipher does not havethe properties of diffusion and confusion, it is longer vulnerableto Kasiski and Friedman attacks based on letter frequencyanalysis. Thus, in this paper we propose a polyalphabetic cipherthat is a new encryption and decryption technique with diffusionand confusion properties based on the concept of the complexcipher used by combining of Vigenère cipher with Affine cipherfor the increase of data security in data storage and transmissionon public communication networks. Our proposed techniquecan also be considered as a complex transformation techniquefrom Affine cipher known as a monoalphabetic cipher techniqueto a new polyalphabetic cipher technique that is calledVigenère-Affine cipher."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Affine cipher"},{"interim":"monoalphabetic cipher"},{"interim":"polyalphabetic cipher"},{"interim":"Vigenère cipher"},{"interim":"complex transformation"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-02-14"}],"displaytype":"preview","filename":"11. -ML0065-Scopus paper- 2019.pdf","filesize":[{"value":"1170 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4568/files/11. -ML0065-Scopus paper- 2019.pdf"},"version_id":"e938edfd-c574-44be-8714-051a9b5b161d"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"International Journal of Machine Learning and Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Tun Myat"},{"subitem_authors_fullname":"Naing, Htet Htet"},{"subitem_authors_fullname":"Hla, Ni Ni"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2019-06"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"2010-3700"},"item_title":"A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher)","item_type_id":"21","owner":"1","path":["1597824227696"],"publish_date":"2020-02-14","publish_status":"0","recid":"4568","relation_version_is_last":true,"title":["A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher)"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:15:07.682968+00:00"}