scispace - formally typeset
Open Access

Combining private and public key encryption techniques for providing extreme secure environment for an academic institution application

Reads0
Chats0
TLDR
This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively, and is self sufficient in terms of the data that it stores.
Abstract
This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes but is not limited to symmetric and public-key cryptography, authentication, key management, and digital signatures. The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively. In other words, it is self sufficient in terms of the data that it stores .

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

New concept of symmetric encryption algorithma hybrid approach of caesar cipher and columnar transposition in multi stages

TL;DR: A new concept of conventional or symmetric encryption algorithm that hybrid two primitive (i.e. Caesar Cipher and Columnar Transposition) and weak approach of encryption algorithm in multi stages to make the new approach more secure and strong than the earlier concept.

Public Key Encryption Techniques Provide Extreme Secure Chat Environment

Kuldeep Chouhan, +1 more
TL;DR: This paper shows results that what security features should implement to accomplish a highly secured chat present a standalone system that can be implemented on any legacy systems with efficiently.
Journal Article

Applied cryptography in password encryption using neural networks

TL;DR: This paper proposes a methodology to implement encryption and decryption using the feed forward neural networks and to improve the security of information systems.
References
More filters
Journal ArticleDOI

Report on the Development of the Advanced Encryption Standard (AES)

TL;DR: Having reviewed further public analysis of the finalists, NIST has decided to propose Rijndael as the Advanced Encryption Standard (AES).
Proceedings ArticleDOI

A new CRT-RSA algorithm secure against bellcore attacks

TL;DR: This paper describes a new algorithm to prevent fault attacks on RSA signature algorithms using the Chinese Remainder Theorem (CRT-RSA), and proves that the new algorithm is secure against the Bellcore attack.
Proceedings ArticleDOI

Cryptanalysis of a provably secure CRT-RSA algorithm

TL;DR: It is demonstrated that the proposed countermeasure to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks is in fact insecure: it can be broken with a simple and practical fault attack.

Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols

TL;DR: In this paper, the disadvantages and threats of WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols are examined in this respect.
Proceedings ArticleDOI

Practical algorithm for data security (PADS) in wireless sensor networks

TL;DR: The approach proposed in this paper is one that solves the problems posed above by embedding a one-time pad, the actual value is distorted enough to make any information gleaned from eavesdropping useless to an attacker.
Related Papers (5)