Font Size: a A A

The Design And Realization Of The Corporation Email System

Posted on:2005-03-05Degree:MasterType:Thesis
Country:ChinaCandidate:Z C TongFull Text:PDF
GTID:2168360125450442Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In this information society, the command of communication between corporations is continually increasing, it is essential for any corporation's survival to obtain and transmit information by a fast and economical way. With the development of Internet technology, as one of the basic services offered by Internet, e-mail has been becoming an important approach to communicate and becoming an indispensable part to realize office automation for its convenience, fastness and cheap expense. More and more Chinese corporations have established their own email systems for systematic management of mailbox and the uniform brand of corporations. The corporation e-mail system is different from the others. Because corporation emails include many business secrecies, the email system has special request for safety.First of all, it is confidentiality that means the contents of e-mails can't be read by a third party. Because corporation emails may contain business secrecies, any leakage of the email contents may lead to suffer loss. Secondly, it can't be juggled. It means that nobody can amend the e-mail after the e-mail is send out .whether the vicious juggling from a third party or the malice amending from the both of communication ,it must lead to the business dissension .Thirdly, it is identification that means both party communications should affirm the identity of the person who sends out the e-mail. It is business behavior that means the sender is on behalf of his or her corporation. The sender should be responsible for the content of e-mail which is sent out by him or her. Identification of the identity can help corporations to avoid the business dissension. At the same time the receiver can confirm the identity of the sender.Finally, it is undeniable which means that the sender needs to have credible evidence to prove that the receiver receives the email after he/she has indeed receive the email. As a result, it can prevent the receiver from denying and avoid needless duty dissension.This article investigates and discusses how to design and realize the e-mail system with perfect security for corporations on the aspect of the technology. By the analysis of the corporation e-mail system and the discussion of various technology about security which is utility applied at present, The article puts forwards the project to solve the security and concrete realization. Confidentiality of data can confirm that the email is read only by authorized person. This system of confidentiality is realized by cryptogram system. At present there are two cryptogram systems: the symmetrical system and the dissymmetrical system. This system adopts the dissymmetrical cryptogram system, in other words, encoding data by public key realizes the confidentiality of data. The integrality that the data can't be juggled means that the system can confirm the integrality of information by inspecting whether the data is changed during the data being sent. This system confirms the integrality of information by adopting the "hash" arithmetic.The identification of user's identity means that the sender is responsible for the e-mail sent by the private key signature and the receiver can confirm the identity by the public key. This system realizes the function of the identification by the digital signature.By sending out the successful sign to the CA authentication center after the receiver succeed in decoding the e-mail, this system realizes the trait that the receiver can't deny receiving the e-mail that has been sent. The CA signs the successful signature by the private key and then sends out it to the sender.The development of the email system depends on the information construction of the Jilin Grain Corporation and is based on its post office. This e-mail system has secure functions such as figure signature, encrypting data and decrypting data. This system adopts the structure of PKI security system and the S/MIME e-mail encoding protocol. By building the security e-mail system we can solve various kinds of insecurity fact...
Keywords/Search Tags:the security of e-mail, figure signature, encoding data, PKI, S/MIME
PDF Full Text Request
Related items