{"created":"2020-09-01T15:06:41.834738+00:00","id":4571,"links":{},"metadata":{"_buckets":{"deposit":"f3f946bb-4d5e-4ceb-bfe5-29e687d0c8d3"},"_deposit":{"id":"4571","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4571"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4571","sets":["1582963302567:1597824227696"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"A Complex Polyalphabetic Cipher Technique: Myanmar Polyalphabetic Cipher","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The rapid development of electronic exchange ofdigital information increases the importance of informationsecurity in storage and transmission of data on publiccommunication network. Cryptography has emerged as asolution that plays a key role in the security of informationagainst malicious attacks. There are various cipher techniques incryptography, such as monoalphabetic cipher, polyalphabeticcipher, etc. to support data confidentiality as securitymechanisms. They are methods of enveloping plain text messageinto cipher text protecting it from adversaries. The process ofencryption of alphabets is the converting original message intonon readable form. The Vigenère cipher is one of the mostcommon basic cipher techniques. It is a polyalphabetic ciphertechnique which uses the Vigenère table for the process ofenveloping English alphabets. But Vigenère cipher is longervulnerable to Kasiski and Friedman attacks based on letterfrequency analysis. Thus, in this paper we propose apolyalphabetic cipher that is a new encryption and decryptiontechnique with diffusion and confusion properties based on theconcept of the complex cipher used by combining of Vigenèrecipher with Affine cipher for the increase of data security in datastorage and transmission on public communication networks.Then, our proposed technique is extended by designing based onMyanmar alphabet characters for the increase of data securityfor Myanmar language. This cipher technique transforms theplain text message in Myanmar alphabet characters into thecipher text in Myanmar alphabet characters using the key inMyanmar alphabet characters."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Affine cipher"},{"interim":"monoalphabetic cipher"},{"interim":"polyalphabetic cipher"},{"interim":"Vigenère cipher"},{"interim":"Myanmar alphabets"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-02-14"}],"displaytype":"preview","filename":"13- ICCCI- IEEE Publication- Scopus-paper 2019.pdf","filesize":[{"value":"1973 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4571/files/13- ICCCI- IEEE Publication- Scopus-paper 2019.pdf"},"version_id":"ea29e07a-4e50-48ae-975d-d94078c67c8d"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"IEEE Proceeding of ICCCI 2019","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Tun Myat"},{"subitem_authors_fullname":"Hla, Ni Ni"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2019-09-02"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"978-1-5386-8259-3"},"item_title":"A Complex Polyalphabetic Cipher Technique: Myanmar Polyalphabetic Cipher","item_type_id":"21","owner":"1","path":["1597824227696"],"publish_date":"2020-02-14","publish_status":"0","recid":"4571","relation_version_is_last":true,"title":["A Complex Polyalphabetic Cipher Technique: Myanmar Polyalphabetic Cipher"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:12:40.198991+00:00"}