Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "7cce4565-f880-484c-a2a9-7ec44cf7fe49"}, "_deposit": {"id": "4602", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4602"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4602", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Nowadays, securing information and message transformation are going with electronic way, thesecurity becomes very important role on public network. Cryptography is readable message convert tounreadable message using encryption/decryption process. Encryption Process is sender and decryptionprocess are receiver side. Commonly, information can be storing with international language such as Englishlanguage. At the present time, everyone is trying to be more secure not only English but also own languagesuch as Myanmar, Chinese, Tamil etc. Confidential data are transferred through with regional language byusing with more innovative method. To secure such information, encryption/decryption plays an importantrole in information security. In cryptography, there are several cipher techniques such as, polyalphabeticcipher, Stream cipher, Block cipher etc. This section using Beaufort cipher is an example of substitutioncipher, In this paper, we propose an advanced encryption algorithm that improves the security of Beaufortencryption by combining it with a modern encryption method such as Stream cipher for the Myanmarlanguage, Stream cipher is considered relatively as an unbreakable method and uses a binary form ( insteadof characters) where Plain text, encrypted text and key are bit string."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "cryptography"}, {"interim": "encryption"}, {"interim": "decryption"}, {"interim": "Beaufort Cipher"}, {"interim": "Stream Cipher"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-03-17"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "HtetHtetNaing.pdf", "filesize": [{"value": "698 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 698000.0, "url": {"url": "https://meral.edu.mm/record/4602/files/HtetHtetNaing.pdf"}, "version_id": "c9720c10-b643-440c-ad9d-fd23a32f77eb"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Naing, Htet Htet"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2020-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-981-14-4787-7"}, "item_title": "Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table", "item_type_id": "21", "owner": "1", "path": ["1597824203644"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004602", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-03-17"}, "publish_date": "2020-03-17", "publish_status": "0", "recid": "4602", "relation": {}, "relation_version_is_last": true, "title": ["Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Faculty of Computer Systems and Technologies

Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table

http://hdl.handle.net/20.500.12678/0000004602
http://hdl.handle.net/20.500.12678/0000004602
820279ad-409d-46e5-afd6-deb7956db4be
7cce4565-f880-484c-a2a9-7ec44cf7fe49
None
Preview
Name / File License Actions
HtetHtetNaing.pdf HtetHtetNaing.pdf (698 Kb)
Publication type
Article
Upload type
Publication
Title
Title Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table
Language en
Publication date 2020-02-28
Authors
Naing, Htet Htet
Aye, Zin May
Description
Nowadays, securing information and message transformation are going with electronic way, thesecurity becomes very important role on public network. Cryptography is readable message convert tounreadable message using encryption/decryption process. Encryption Process is sender and decryptionprocess are receiver side. Commonly, information can be storing with international language such as Englishlanguage. At the present time, everyone is trying to be more secure not only English but also own languagesuch as Myanmar, Chinese, Tamil etc. Confidential data are transferred through with regional language byusing with more innovative method. To secure such information, encryption/decryption plays an importantrole in information security. In cryptography, there are several cipher techniques such as, polyalphabeticcipher, Stream cipher, Block cipher etc. This section using Beaufort cipher is an example of substitutioncipher, In this paper, we propose an advanced encryption algorithm that improves the security of Beaufortencryption by combining it with a modern encryption method such as Stream cipher for the Myanmarlanguage, Stream cipher is considered relatively as an unbreakable method and uses a binary form ( insteadof characters) where Plain text, encrypted text and key are bit string.
Keywords
cryptography, encryption, decryption, Beaufort Cipher, Stream Cipher
Identifier 978-981-14-4787-7
Journal articles
Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:10:26.217245
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL