{"created":"2020-09-01T15:10:20.878798+00:00","id":4602,"links":{},"metadata":{"_buckets":{"deposit":"7cce4565-f880-484c-a2a9-7ec44cf7fe49"},"_deposit":{"id":"4602","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4602"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4602","sets":["1582963302567:1597824203644"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Nowadays, securing information and message transformation are going with electronic way, thesecurity becomes very important role on public network. Cryptography is readable message convert tounreadable message using encryption/decryption process. Encryption Process is sender and decryptionprocess are receiver side. Commonly, information can be storing with international language such as Englishlanguage. At the present time, everyone is trying to be more secure not only English but also own languagesuch as Myanmar, Chinese, Tamil etc. Confidential data are transferred through with regional language byusing with more innovative method. To secure such information, encryption/decryption plays an importantrole in information security. In cryptography, there are several cipher techniques such as, polyalphabeticcipher, Stream cipher, Block cipher etc. This section using Beaufort cipher is an example of substitutioncipher, In this paper, we propose an advanced encryption algorithm that improves the security of Beaufortencryption by combining it with a modern encryption method such as Stream cipher for the Myanmarlanguage, Stream cipher is considered relatively as an unbreakable method and uses a binary form ( insteadof characters) where Plain text, encrypted text and key are bit string."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"cryptography"},{"interim":"encryption"},{"interim":"decryption"},{"interim":"Beaufort Cipher"},{"interim":"Stream Cipher"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-03-17"}],"displaytype":"preview","filename":"HtetHtetNaing.pdf","filesize":[{"value":"698 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4602/files/HtetHtetNaing.pdf"},"version_id":"c9720c10-b643-440c-ad9d-fd23a32f77eb"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Proceedings of the 10th International Workshop on Computer Science and Engineering (WCSE 2020)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Naing, Htet Htet"},{"subitem_authors_fullname":"Aye, Zin May"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2020-02-28"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"978-981-14-4787-7"},"item_title":"Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table","item_type_id":"21","owner":"1","path":["1597824203644"],"publish_date":"2020-03-17","publish_status":"0","recid":"4602","relation_version_is_last":true,"title":["Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T03:31:25.104897+00:00"}