Book Details

Study on New Architecture for Enhancing the Security and Performance of E-Mail Security Protocols

IT Skills Show & International Conference on Advancements in Computing Resources, (SSICACR-2017) 15 and 16 February 2017, Alagappa University, Karaikudi, Tamil Nadu, India. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

E-mail communication still has to cope with certain security problems. The most visible result is the mass of unsolicited messages outnumbering the regular e-mails in magnitudes. The technical reasons for this unfavourable situation are manifold e.g., unreliable sender authentication, Loose and ad-hoc coupling between the involved servers, and only few ways to complain about misbehaviour of users of foreign systems. To make e-mail communication secure and private, e-mail servers incorporate one or more security features using add-on security protocols. The add-on Security protocols provide a reasonable security. We present and discuss a number of improvements to the practicability of e-mail encryption. These enable efficient searching in encrypted e-mails as well as subject encryption and the use of cryptographic functions in calendar applications. We propose bridge-type e-mail proxy architecture to release the bottlenecks of the two popular mail security architectures: software mail filter and e-mail gateway.

References

[1] Jay Chaudhry. “The e-mail battlefield: build a defense,” May, 2002 .

[2] Hal Beghel, Email-The Good, “The Bad, and the Ugly,” Communication of ACM, Vol.40, No.4, April 1997.

[3] Lorrie Faith Cranor and Brian A LaMacchia, “SPAM!,” Communication of ACM, Vol. 41. No.8, August 1998

[4] Klensin, (2001) „Simple Mail Transfer Protocol? IETF RFC 2821.

[5] Mir, F.A., Banday, M.T. (2010). “Control of Spam: A Comparative Approach with special reference to India”,.

[6] Banday, M.T., Qadri, J.A. (2010). “A Study of E-mail Security Protocols,”

[7] Banday, M.T., Mir, F.A., Qadri, J.A., Shah, N.A. (2011). “Analyzing Internet E-mail Date Spoofing”,

[8] C. E. Landwegr, C. L. Heitmeyer, and J. D. McLean, (2001) “A security model for military message systems: Retrospective,” Naval Research Laboratory, Wasgington, DC, 2001

[9] R. Oppliger, (2004 ) “Certified Mail: the next challenge for secure messaging”, Communications of ACM, Vol. 47, No. 8, pp. 75-79.

[10] Tahir Elgamel, and Kipp E. B. Hipman, (1997) “Secure Socket Layer Application Program Apparatus and Method” U.S. Patent No:5657390.

[11] P. Hoffman, (2002) “SMTP Service Extension for Secure SMTP over Transport Layer Security”, IETF RFC 3207.

[12] S. Suzuki and M. Nakamura, (2005) “Domain Name System—Past, Present and Future”, IEICE Transactions of Communication, E88b (3), pp. 857-864.

Keywords

Communication, Security protocols, encryption, cryptographic, proxy architecture, efficient, bridge-type

Image
  • Format Volume 5, Issue 1, No 24, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Author Dr. C. Balakrishnan, Ms. M. Rekha
  • Reference IJCS-275
  • Page No 1782-1788

Copyright 2022 SK Research Group of Companies. All Rights Reserved.