Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

An End-to-End Secured Email System using Base64 Algorithm

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2020
Abolore Muhamin Logunleko, Kolawole Bariu Logunleko, Olanrewaju Olaide Lawal

Abolore Muhamin Logunleko, Kolawole Bariu Logunleko and Olanrewaju Olaide Lawal. An End-to-End Secured Email System using Base64 Algorithm. International Journal of Computer Applications 175(28):1-6, October 2020. BibTeX

	author = {Abolore Muhamin Logunleko and Kolawole Bariu Logunleko and Olanrewaju Olaide Lawal},
	title = {An End-to-End Secured Email System using Base64 Algorithm},
	journal = {International Journal of Computer Applications},
	issue_date = {October 2020},
	volume = {175},
	number = {28},
	month = {Oct},
	year = {2020},
	issn = {0975-8887},
	pages = {1-6},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2020920669},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In this present days, email system has turned out to be the broadly way to exchange information from one person to the other. Traditional email system is a one layer authentication system that is secured by username and password which are not enough to ascertain security. The email is connected through many routers and mail servers on its way to the recipient by becoming vulnerable to both physical as well as virtual eavesdropping by unauthorised person. This leaves a digital papers trail thereby more privacy and confidentiality of sensitive information is required. Encryption is of prime importance when confidential data is transmitted over the network. The system is developed to allow users to encrypt information before it is transmitted over the network. Base64 Algorithm was used for encryption and decryption of the information. This system runs on any device which works on windows operating system platform. The developed system secures the sensitive information sent through email by providing a secure, fast, and strong encryption which makes the mail very difficult for an attacker to interpret while in transmission thus making it resistant to forms of attacks. The various uses of this system in real life and its functionality are explained in this paper.


  1. Abadi, M., and Blanchet, B. (2003).Computer-Assisted Verification of a Protocol for Certified Email, Static Imperial College Press 200,ISBN 978-1-86094-866-4.
  2. Shreenath, A., Aureen, G., Deepthi, S and Tania, P., (2014) “Smart Mailing System for Secure Transmissions” International Journal of Computer Applications Pp0975 – 8887, Volume 96– No.22.
  3. Suresh, K. B. and Jagathy, R. V.(2012): A Secure Email System Based on IBE, DNS and Proxy Service, Journal of Emerging Trends in Computing and Information Sciences, Vol. 3, No. 9 Sep, ISSN 2079-8407.
  4. Tech Savvy Senior (2018). Introduction to email part1, Beginner guide.
  5. Ada, L., Eric, Z., and Franziska, R. (2017).Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists, IEEE European Symposium on Security & Privacy.
  6. Burke County Public Library (2010). Electronic Mail Basics. Retrieved from
  7. Christa, D. and Carmen, F. (2016): Email Communication Pp35-54. Retrieved from
  8. Giampaolo, B., Cristiano, L., and Lawrence, C. (2003).Verifying Second-Level Security Protocols, Lecture Notes in Computer Science, Volume 2758, pp 352-366, Springer Berlin Heidelberg.
  9. Guwalani P, Kala M, Chandrashekar R, Shinde dan J and Mane D. (2014). Image File Security using Base64 Algorithm, Int. J. Computer Technology & Applications, vol. 5, no. 6, pp. 1892-189.
  10. Karen, R., Judith, R., and Mario, H.(2006). You’ve Got E-Mail!… Shall I Deal With It Now? Electronic Mail from the Recipient’s Perspective, International Journal of Human Computer Interaction, 21(3), 313–332.
  11. Logunleko K. B, Logunleko A. M, Akinwunmi O. O. & Lawal O. O. (2019): Security Assurance Framework for Intelligible Information Using a Customized Base64 Encryption Algorithm Proceedings of the 17th iSTEAMS Multidisciplinary Research Nexus Conference, D.S. Adegbenro ICT Polytechnic, Itori- Ewekoro, Ogun State, Nigeria, 21st – 23rd July, 2019.Pp 85-93 . - DOI Affix - 10.22624/AIMS/iSTEAMS-2019/V17N2P10
  12. Martin, A., Neal, G., Bill, H., and Benny, P.,(2002) “Certified email with a light on-line trusted third party: Design and implementation”, 11th international conference on world wide web, pp. 387- 395, ACM, New York, ISBN:1-58113-449-5.
  13. Mohammed, H., Nashwa, M., Bazara, B., and Eihab, B.,(2013) “An End-to-End Secure Mail System Based on Certificateless Cryptography in the Standard Security Model” in IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 3,Pp 264-271,ISSN (Print): 1694-0814| ISSN (Online): 1694-0784
  14. Robbi, R. (2018). Combination Base64 Algorithm and EOF Technique for Steganography. International Conference on Information and Communication Technology (IconICT): Journal of Physics: Conf. Series 1007.


Base64 Algorithm, Decryption, Email, Encryption, Information