We tested our applications on the system used for our experiments(see Section 8).We used ssh-keygen to generate a new private and public key for DSA authentication; the generated private key was encrypted while the public key was not encrypted. We then installed the public key on another system and used ssh to log into that system using DSA authentication.