Font Size: a A A

Design And Implement Of Safe E-mail System Based On Permutation Code

Posted on:2004-09-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2168360092986244Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As an asynchronous messaging method, E-mail has wide application, which has close relation to modem Education and credence in law. But E-mail is confronted with so many kinds of security hazards. Ordinary E-mail has such little security protection that sneaking, falsification, counterfeit and denying can not be prevented. There is currently a lot of ongoing activity in the scientific community to extend or study the security of E-mail. And we must take effective actions to safeguard the information of E-mail.In this paper, against so many kinds of hazards in E-mail application, not changing the E-mail protocols in existence, we embed a good encryption algorithm, Permutation Code in the system to safeguard the information of E-mail, introduce Public-key cipher to implement transfer of session keys safely, implement Authentication and Integrity of information, and introduce essential key management mechanism.It's worth notice that, because the efficiency of Public-key Cipher is low, we introduce symmetric cipher, Permutation Code, and asymmetric cipher, RSA algorithm into the system to advance the efficiency of the whole system.
Keywords/Search Tags:Permutation Code, RSA algorithm, key management, key transfer, Digital Signature
PDF Full Text Request
Related items