Font Size: a A A

Design And Implementation Of Secure E-mail System

Posted on:2008-03-06Degree:MasterType:Thesis
Country:ChinaCandidate:J LuoFull Text:PDF
GTID:2208360215485034Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of communications network, variousnetwork services are used in people's daily life, as E-mail has become oneof the most important way for people to communicate between each other,by the way, of course, the more and more crucial role which the E-mailact as, make users put more and more attention on security problems.In this paper, the basic principle and some typical secure E-mailprotocol are researched, and each security factor in E-mail service areanalyzed, our research focus on both authentication and confidentialitywhich a secure E-mail system should offered, design the architecture ofsecure E-mail system, proposed a new kind of proxy multi-signature tosatisfy applied demand, and by using balance theory in hash design,proposed a new hash algorithm combining SHA and AES, so as tostrengthen the security and anti-attacking ability of hash function, anduses a mixed scheme to ensure the confidentiality of information, designoperations of network communications and security as two normalcomponent respectively, so can be repeatable and be updated.In the end, through researching and designing, combine variousencryption algorithms with the architecture of secure mail, a secureelectronic mail system which be applied is taken up and, at the same time,there are some things need to be done in the future.
Keywords/Search Tags:information security, multi-signature, proxy signature, discrete logarithm problem, hash function
PDF Full Text Request
Related items