CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Smart Mailing System for Secure Transmissions

by Shreenath Acharya, Aureen Gomes, Deepthi Suvarna, Tania Paulson, Vishrutha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 22
Year of Publication: 2014
Authors: Shreenath Acharya, Aureen Gomes, Deepthi Suvarna, Tania Paulson, Vishrutha
10.5120/16928-7033

Shreenath Acharya, Aureen Gomes, Deepthi Suvarna, Tania Paulson, Vishrutha . Smart Mailing System for Secure Transmissions. International Journal of Computer Applications. 96, 22 ( June 2014), 28-33. DOI=10.5120/16928-7033

@article{ 10.5120/16928-7033,
author = { Shreenath Acharya, Aureen Gomes, Deepthi Suvarna, Tania Paulson, Vishrutha },
title = { Smart Mailing System for Secure Transmissions },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 22 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number22/16928-7033/ },
doi = { 10.5120/16928-7033 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:22:29.512046+05:30
%A Shreenath Acharya
%A Aureen Gomes
%A Deepthi Suvarna
%A Tania Paulson
%A Vishrutha
%T Smart Mailing System for Secure Transmissions
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 22
%P 28-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Email system has become the widely preferred means of information transfer in the modern business. Conventional email system is secured by a password system leading to a single layer of protection which is insufficient for guaranteed security. Modern businesses are more relying on electronic mail for communication with their clients and colleagues revealing the need for more privacy of sensitive information. The email is connected through many routers and mail servers on its way to the recipient by becoming vulnerable to both physical as well as virtual eavesdropping. The current industry standards do not place much emphasis on security as the information is transferred in plain text and the mail servers will be regularly performing the backups of the emails passing through. This leaves a digital paper trail that can be easily inspected months or years later which can be read by any cracker who gains access to an unprotected router. The proposed system helps to secure the sensitive information sent through email by providing a three layer authentication mechanism.

References
  1. Email Security - What Are The Issues? http://www. net- security. org/article. php?id=816
  2. Email: the forgotten security problem http://nakedsecurity. sophos. com/2012/11/07/email-systems-are-fundamentally-insecure/
  3. Security Issues and Solutions in Internet E-mail http://www. cuhk. edu. hk/itsc/network/app/email/security/securityissues. htm
  4. The Radicati Group, INC, A Technology Market Research Firm, Email Statistics Report 2013-2017, Available:http://www. radicati. com/wp/wpcontent/uploads/2013/04/Email - Statistics - Report - 2013 - 2017-Executive-Summary. pdf, Visited: 28 March 2013
  5. Giampaolo Bella, Cristiano Longo and Lawrence C Paulson,"Verifying Second-Level Security Protocols", Lecture Notes in Computer Science", Volume 2758, pp 352-366, Springer Berlin Heidelberg, 2003
  6. Dan Zhou, Joncheng C. Kuo, Susan Older and Shiu-Kai Chin, "Formal Development of Secure Email", HICSS-32. Proceedings of the 32nd IEEE Annual Hawaii International Conference on System Sciences, 1999, Maui, HI, USA
  7. M. Abadi and B. Blanchet, "Computer-Assisted Verification of a Protocol for Certified Email", Static Analysis, 10th International Symposium (SAS'03), Volume 2694, pp. 316-335, Lecture Notes in Computer Science (LNCS),San Diego, California, June 2003. Springer Verlag.
  8. L. C. Paulson, "The inductive approach to verifying cryptographic protocols", Journal of Computer Security, Vol. 6, 85 - 128, 1998.
  9. Martin Abadi, Neal Glew, Bill Horne and Benny Pinkas, "Certified email with a light on-line trusted third party: Design and implementation", 11th international conference on world wide web, pp. 387- 395, ACM, New York, ISBN:1-58113-449-5, 2002.
  10. Brian Donadi, A Guide E-Mail Systems and Security, Available: http://www. infosecwriters. com/text_resources /pdf/BDona dio_Email. pdf.
  11. L. C. Paulson, "Inductive analysis of the internet protocol TLS", ACM Transactions on Information and System Security, 2(3): 332 - 351, 1999.
Index Terms

Computer Science
Information Sciences

Keywords

One Time Password (OTP) Email Encryption Decryption Authentication Plain Text Cipher Text