Study on New Architecture for Enhancing the Security and Performance of E-Mail Security Protocols
IT Skills Show & International Conference on Advancements in Computing Resources, (SSICACR-2017) 15 and 16 February 2017, Alagappa University, Karaikudi, Tamil Nadu, India. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
E-mail communication still has to cope with certain security problems. The most visible result is the mass of unsolicited messages outnumbering the regular e-mails in magnitudes. The technical reasons for this unfavourable situation are manifold e.g., unreliable sender authentication, Loose and ad-hoc coupling between the involved servers, and only few ways to complain about misbehaviour of users of foreign systems. To make e-mail communication secure and private, e-mail servers incorporate one or more security features using add-on security protocols. The add-on Security protocols provide a reasonable security. We present and discuss a number of improvements to the practicability of e-mail encryption. These enable efficient searching in encrypted e-mails as well as subject encryption and the use of cryptographic functions in calendar applications. We propose bridge-type e-mail proxy architecture to release the bottlenecks of the two popular mail security architectures: software mail filter and e-mail gateway.
 Jay Chaudhry. “The e-mail battlefield: build a defense,” May, 2002 .
 Hal Beghel, Email-The Good, “The Bad, and the Ugly,” Communication of ACM, Vol.40, No.4, April 1997.
 Lorrie Faith Cranor and Brian A LaMacchia, “SPAM!,” Communication of ACM, Vol. 41. No.8, August 1998
 Klensin, (2001) „Simple Mail Transfer Protocol? IETF RFC 2821.
 Mir, F.A., Banday, M.T. (2010). “Control of Spam: A Comparative Approach with special reference to India”,.
 Banday, M.T., Qadri, J.A. (2010). “A Study of E-mail Security Protocols,”
 Banday, M.T., Mir, F.A., Qadri, J.A., Shah, N.A. (2011). “Analyzing Internet E-mail Date Spoofing”,
 C. E. Landwegr, C. L. Heitmeyer, and J. D. McLean, (2001) “A security model for military message systems: Retrospective,” Naval Research Laboratory, Wasgington, DC, 2001
 R. Oppliger, (2004 ) “Certified Mail: the next challenge for secure messaging”, Communications of ACM, Vol. 47, No. 8, pp. 75-79.
 Tahir Elgamel, and Kipp E. B. Hipman, (1997) “Secure Socket Layer Application Program Apparatus and Method” U.S. Patent No:5657390.
 P. Hoffman, (2002) “SMTP Service Extension for Secure SMTP over Transport Layer Security”, IETF RFC 3207.
 S. Suzuki and M. Nakamura, (2005) “Domain Name System—Past, Present and Future”, IEICE Transactions of Communication, E88b (3), pp. 857-864.
Communication, Security protocols, encryption, cryptographic, proxy architecture, efficient, bridge-type