Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application

Loading...
Thumbnail Image

Authors

Rizvi, Syed S.
Riasat, Aasia
Elleithy, Khaled M.

Issue Date

2010-01

Type

Article

Language

en_US

Keywords

Data inscription standard , Rijndael algorithm , Secret key algorithm , Wired equivalent privacy (WEP)

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes but is not limited to symmetric and public-key cryptography, authentication, key management, and digital signatures. The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively. In other words, it is self sufficient in terms of the data that it stores.

Description

Citation

Publisher

AIRCC Publishing

License

Journal

Volume

Issue

PubMed ID

DOI

ISSN

EISSN