Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application
Loading...
Authors
Rizvi, Syed S.
Riasat, Aasia
Elleithy, Khaled M.
Issue Date
2010-01
Type
Article
Language
en_US
Keywords
Data inscription standard , Rijndael algorithm , Secret key algorithm , Wired equivalent privacy (WEP)
Alternative Title
Abstract
This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes but is not limited to symmetric and public-key cryptography, authentication, key management, and digital signatures. The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively. In other words, it is self sufficient in terms of the data that it stores.
Description
Citation
Publisher
AIRCC Publishing
