Font Size: a A A

Implementation And Design Of Automatic Mail Encryption Authentication System Based On Communication History

Posted on:2023-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:W Q ZhouFull Text:PDF
GTID:2568307097994999Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Despite today’s rapid technological advances,email still plays an essential role in formal business activities,and the leakage of business secrets contained in emails can cause incalculable damage to the company.The main problem with today’s email systems is that emails are not encrypted and authenticated,and although the subject of email security has been raised for decades,there is still no user-friendly or user-friendly solution that is quick and easy to use.Various email service providers have tried to use public key cryptography to solve email encryption,but the results are not satisfactory.Based on the fact that most mailbox users do not have professional background,there is an urgent need for an email system that can do the following: 1.Encryption and decryption process can be done without learning or understanding cryptography related knowledge between recipients and senders.2.The key should be dynamic,and the key stolen at a certain moment The key should be dynamic,and the theft of the key at one moment should have an impact on the confidentiality of as few historical and future emails as possible.3.Ensure that the sender in the email header of the email is the real actual sender to prevent email fraud and falsification of the sender’s identity.4.The content of the email should be encrypted and only the recipient and sender can decrypt it,and even the email service provider cannot be informed of the real content of the email.5.The identity of the other party with whom the communication is made and the content of the communication should be deniable,so that both parties can deny at any time that they are the communicating party or have made some content of the communication.To this end,this paper analyzes in detail the current problems in the use and encryption and decryption process of various email encryption algorithms and applications,and designs and implements an automatic email encryption authentication system based on communication history to achieve the above functions.
Keywords/Search Tags:email encryption, user-friendly, repudiation, dynamic key
PDF Full Text Request
Related items