12.07.2015 Views

DESIGN AND IMPLEMENTATION OF A PRIVATE AND PUBLIC KEY ...

DESIGN AND IMPLEMENTATION OF A PRIVATE AND PUBLIC KEY ...

DESIGN AND IMPLEMENTATION OF A PRIVATE AND PUBLIC KEY ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Design and Implementation of a Private and Public Key Crypto Processor for Next-Generation IT Security Applications pp. 29 - 45Fig. 2: The GUI of the e-document security systemFig. 3(a): Security scheme for Sender File UploadIn the receiving process, the now secured document undergoes the recovery process depicted in the security schemegiven in Fig. 3(b) to recover the original data, that is:1. ECDSA verifying module verifies the received digital signature, using sender ECC public key. If thissignature verification fails, the receiving process stops here, else continue.2. Using receiver RSA private key, the RSA Decryptor decrypts the encrypted session key to recover the AESsession key.3. With this key, the AES decryptor decrypts ciphertext to recover original document.Fig. 3(b): Security scheme for Receiver File Download32Malaysian Journal of Computer Science, Vol. 19(1), 2006

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!