Font Size: a A A

Design And Implementation Of Mail Cryptosystem Based On IBE Technology

Posted on:2017-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y W ZhangFull Text:PDF
GTID:2348330485958426Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development and popularization of Internet, more and more people use E-mail to communication each other, and Many confidential information transmitted via email. Especially for these years, with the rapid development of E-commerce and E-government, E-mail has brought a lot of convenience to people's work and life as a basic tool for these system. The most of popular E-mail can't satisfy the user, because most of them haven't crypto function.In order to meet the needs of the actual operation experience and the mail security, this paper designs and implements a mail cryptosystem based on IBE technology, the main work is as follows:First, this paper analyzed the popular email encryption products in market.According to the research and analysis on the basis of cryptography and the security standard of e-mail system, several technical systems of mail encryption products are summarized. Through contrastive analysis, it's found that PKI/CA based encryption scheme is the most mature but the certificate of operation is very complex, IBE based encryption scheme can direct use the user's email address as the public key and avoid the certificate of the complex operation.Therefore, IBE technology is very suitable for the mail encryption products.Then, this paper takes the BF-IBE scheme as the foundation, combined with AES encryption and decryption technology, digital signature technology, design and implement the IBE based encryption and decryption system. In the system,realized mail message encryption and decryption of the client, authentication of the server, private key generation and transmission security, system initialization,master key system parameters and timing replacement strategies and other functions.Finally, according to the division of system function module, the corresponding test cases are designed, and the test and analysis of each module iscarried out by the related testing tools. The test results show that the system has good practicability. Through security analysis, the system can maintain the higher security intensity. After encrypted mail message can effectively prevent leakage, tampering, imitation and denial of risk.Compared with other email encryption system, in this E-mail encryption and decryption system:(1) The sender directly to using the sender's E-mail address as the public key,and no need to do complex operation.(2) Combined with the E-mail invitation mechanism, receiver can easily join the system.(3) Using the key timing replacement strategy to increased the strength of system security.(4) Providing an interface for the third-party application to translate the secret information in android platform.
Keywords/Search Tags:Public Key Cryptography, Secure E-mail, Encryption system, Identity based encryption
PDF Full Text Request
Related items