CFP last date
20 June 2024
Reseach Article

On the Authentication of Date in E-mail using Trusted Time Stamping Service

Published on December 2011 by M. Tariq Banday
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 3
December 2011
Authors: M. Tariq Banday

M. Tariq Banday . On the Authentication of Date in E-mail using Trusted Time Stamping Service. Network Security and Cryptography. NSC, 3 (December 2011), 36-42.

author = { M. Tariq Banday },
title = { On the Authentication of Date in E-mail using Trusted Time Stamping Service },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 3 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 36-42 },
numpages = 7,
url = { /specialissues/nsc/number3/4341-spe038t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Special Issue Article
%1 Network Security and Cryptography
%A M. Tariq Banday
%T On the Authentication of Date in E-mail using Trusted Time Stamping Service
%J Network Security and Cryptography
%@ 0975-8887
%N 3
%P 36-42
%D 2011
%I International Journal of Computer Applications

In e-mail date spoofing an e-mail message contains forged date field that keeps e-mails listed on top in recipient’s mailbox in some commercial and corporate e-mail servers, thereby maximizing the chances of immediate attention by its recipients. The date header field in a date spoofed e-mail may contain a date which is ahead or before the actual date it was sent and thus a date spoofed e-mail may be either a pre-dated or a post-dated message. E-mail date spoofing which emerged as a spamming trick can lead to manifold of problems like i) confusion to recipients, ii) loss of work productivity, iii) increase in false positive, iv) various time scheduling problems, v) increases chances of opening spam, vi) host legal issues, and vii) render date field insignificant. Date header field of an e-mail message is a trust field and can be violated without being detected by protocols involved in the e-mail system. To ensure credibility of dates in e-mail messages a trust mechanism can be devised by incorporating a trusted date and time signature at sending, transporting and receiving MTAs by the use of some designated third party Trusted Time Stamping Service (TTS). A TTS supports assertions of proof that a datum existed before a particular time. In order to associate a datum with a particular point in time, a Time Stamp Authority (TSA) may need to be used. This trusted third party provides a proof-of-existence of a particular datum at a given time. The TSA can also be used to indicate the time of submission when a deadline is critical, or to indicate the time of transaction for entries in a log. A digital time stamping service issues timestamps which associate a date and time with a digital document in a cryptographically strong way. The digital time stamp can be used at a later date to prove that an electronic document existed at the time stated in its time stamp. This paper proposes an effective measure employing the use of trusted third party time stamping service for authentication of date in e-mail messages. The model proposed can check and control date-spoofing at sending, forwarding, or receiving servers.

  1. Banday, M.T., Mir, F.A., Qadri, J.A., Shah, N.A. 2011. Analyzing Internet E-mail Date Spoofing, Journal of Digital Investigation, vol. 7, pp. 145-153, DOI:10.1016/j.diin.2010.11.001, URL: http://www.sciencedir S1742287 610000812.
  2. Klensin. 2001.Simple Mail Transfer Protocol. IETF RFC 2821, URL:
  3. Banday, M.T. 2011. Algorithm for Detection and Prevention of E-mail Date Spoofing. International Journal of Computer Applications, vol. 21(.6), pp. 7-11, DOI: 10.5120/2518-3421, URL: volume21/number6/pxc3873421.pdf.
  4. Tzerefos, P.,Smythe, C.,Stergiou, I.,Cvetkovic, S., 1997. A comparative study of Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP) and X.400 Electronic Mail Protocols.Local Computer Networks, Proceedings on 22nd Annual Conference on 2-5 Nov. 1997 pp. 545 – 554.
  5. Crispin, M. R. 2003. Internet Message Access Protocol - Version 4 rev 1. IETF RFC 3501.
  6. Mir, F.A., Banday, M.T. 2010. Control of Spam: A Comparative Approach with special reference to India. Journal of Information Technology Law, vol. 19(1), pp.22-59, DOI: 10.1080/13600831003589350, URL: http://dx.
  7. Banday, M.T., Qadri, J.A. 2010. A Study of E-mail Security Protocols.eBritian, British Institute of Technology and E-commerce, Issue 5, Summer 2010, pp. 55-60, URL:
  8. Banday, M.T. 2011. Easing PAIN with Digital Signatures. International Journal of Computer Applications, 29(2), pp. 46-56, DOI: 10.5120/3533-4822, URL: http://research number2/ pxc3874822.pdf.
  9. Resnick, P., Ed. 2011. Internet Message Format. IETF RFC 2822, URL:
  10. Cronk, R. 2003. Time: The Currency of Computer Crime, Symmetricom, URL: ABOUT_ DOWNLOADS/forensics.pdf.
  11. Adams,C., Pinkas, D., Cain, P., Zuccherato, R. 2001. Internet X.509 Public Key Infrastructure Time Stamp Protocols (TSP). IETF RFC 3161, URL:
  12. Tsutomu, M., Tadahiro, S., Keisuke, I.2007. Time stamping system for electronic documents and program medium for the same. US Patent No: 7266698, URL: patent/7266698.html.
  13. Ramsdell, B., Ed., 2004, Secure/multipurpose internet mail extensions (S/MIME) version 3.1 message specification. RFC 3851, URL:
  14. Axelle, A., Vincent, G. 2002. XML Security Time Stamping Protocol, Cover Pages. URL:
Index Terms

Computer Science
Information Sciences


E-mail Date Spoofing Security Protocols E-mail Security Time Stamping Trusted Time Stamping Service TSS Time Stamping Authority TSA