IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cryptography in Electronic Mail

Cryptography in Electronic Mail
View Sample PDF
Author(s): Hosnieh Rafiee (Hasso Plattner Institute, Germany), Martin von Löwis (Hasso Plattner Institute, Germany)and Christoph Meinel (Hasso Plattner Institute, Germany)
Copyright: 2013
Pages: 22
Source title: Theory and Practice of Cryptography Solutions for Secure Information Systems
Source Author(s)/Editor(s): Atilla Elçi (Hasan Kalyoncu University, Turkey), Josef Pieprzyk (Macquarie University, Australia), Alexander G. Chefranov (Eastern Mediterranean University, North Cyprus), Mehmet A. Orgun (Macquarie University, Australia), Huaxiong Wang (Nanyang Technological University, Singapore)and Rajan Shankaran (Macquarie University, Australia)
DOI: 10.4018/978-1-4666-4030-6.ch016

Purchase

View Cryptography in Electronic Mail on the publisher's website for pricing and purchasing information.

Abstract

Electronic Mail (email) is a very important method of communicating across the Internet, but the protocols used to handle emails during transmission, downloads, and organizational processes are not secure. Spammers and scammers misuse these protocols to propagate spam or scams across the Internet for advertising purposes or to gain access to critical data, such as credit card information. Cryptographic approaches are applied as a tool to help in securing email components, such as the header, data, etc. This chapter classifies the approaches used according to the protection mechanisms provided to the email components, and it also briefly describes these approaches. Because scammers are continually trying to crack current algorithms, the most recent improvements in email security using cryptography are covered in this discussion. An explanation is given as to the need for verifying both receivers and senders in this process. Finally, the authors examine how the use of these approaches will work in IPv6 as compared to IPv4.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom