CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure E-Mail Messaging to Selected Group Members using PGP Technique

by Sachin Tripathi, G.P.Biswas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 10
Year of Publication: 2010
Authors: Sachin Tripathi, G.P.Biswas
10.5120/217-366

Sachin Tripathi, G.P.Biswas . Secure E-Mail Messaging to Selected Group Members using PGP Technique. International Journal of Computer Applications. 1, 10 ( February 2010), 76-80. DOI=10.5120/217-366

@article{ 10.5120/217-366,
author = { Sachin Tripathi, G.P.Biswas },
title = { Secure E-Mail Messaging to Selected Group Members using PGP Technique },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 10 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 76-80 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number10/217-366/ },
doi = { 10.5120/217-366 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:45:50.512808+05:30
%A Sachin Tripathi
%A G.P.Biswas
%T Secure E-Mail Messaging to Selected Group Members using PGP Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 10
%P 76-80
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The E-mail messaging is one of the most popular uses of the Internet and the multiple Internet users can exchange messages within short span of time using To(Original recipient) ,Cc(Carbon Copy) and /or Bcc(Blind Carbon copy) facilities. Although the security of the important E-mail messages is an important issue, no such security is supported by the Internet standards. Recently one well known scheme, called PGP (Pretty Good Privacy) is proposed for personal security of E-mail messages, but it can transmit encrypted message to single recipient only,i.e. ,the same encrypted message can not be transmitted to the multiple recipients if Cc and Bcc options are used. This paper proposes two modifications of the PGP that avoid the limitation of the PGP of not transmitting same encrypted message to multiple receipients.The basic idea is that a group comprising To, Cc and Bcc recipients is initially formed, a group key among them is generated using any group key generation scheme, which is then used (instead of the using the public key of the single recipients as done in PGP) to encrypt the session key. Since the secret group key is known to all recipients, they can extract session key and decrypt the confidential message correctly. This is one of the proposed modifications of PGP technique. The other modification is to remove the use of public key cryptosystem in PGP and this is done simply by generating signature of the E-mail message using group key (instead of using the sender’s private key).It not only increases the processing speed of the PGP, but also simplifies it by avoiding to preserve the private key ring and public key ring of the participants.

References
  1. John Linn,’privacy Enhancement for Internet Electronic Mail, Part I :Message Encryption and Authentication procedures,”RFC 1421, February 1993
  2. Philip Zimmermann ,”The official PGP User’s Guide,”,MIT Press,1995
  3. Black Ramsdell,”S/MIME Version 3 Message Specification,”RFC2633,June 1999
  4. Shanyu Zheng, David Manz, JIM Alves-Foss: A Communication –Computation efficient group key algorithm for large and dynamic groups. Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 51, Issue 1, January 2007 ,pp: 69 - 93 , 2007.
  5. Y.Kim A.Perrig, G.Tsudik, Tree based group key agreement, ACM Transactions on Information and System Security, 7(1) ,pp:60-96,2004.
  6. Y.Kim, A.Perrig, G.Tsudik, Communication efficient group key agreement .In proceeding 16thInternational conference on information security: Trusted Information: New decade challenge, June 11-13, 2001, Paris,France
  7. Group Key agreement efficient in communication, IEEE transaction on computers, Vol. 53 n.7 pp.095-921, July 2004
  8. Sachin Tripathi and G.P.Biswas “Design of Efficient Ternary-Tree Based Group Key Agreement Protocol for Dynamic Groups “ in proceeding of IAMCOM 2009 held in conjunction with IEEE COMSNETS, January 2009, Bnagalore,India
  9. Data Communications and Networking, Behrouz A Forouzan, TMH Publication
  10. William Stalling ‘Cryptography and Network Security ,PHI
Index Terms

Computer Science
Information Sciences

Keywords

Pretty Good Privacy (PGP) CCEGK Group Key Algorithm Asymmetric and Symmetric Cryptography