Pehchanmail: IBE Based E-Token Authenticated Secure Email
Rakesh Shukla1, Hari Om Prakash2, R. Phanibhusan3, S. Venkataraman4, Geeta Varadan5
1Rakesh Shukla, Department of Space, ADRIN, Secunderabad (Telangana), India.
2Hari Om Prakash, Department of Space, ADRIN, Secunderabad (Telangana), India.
3R. Phani Bhushan, Department of Space, ADRIN, Secunderabad (Telangana), India.
4S. Venkataraman, Department of Space, ADRIN, Secunderabad (Telangana), India.
5Geeta Varadan, Department of Space, ADRIN, Secunderabad (Telangana), India.
Manuscript received on 20 March 2014 | Revised Manuscript received on 25 March 2014 | Manuscript published on 30 March 2014 | PP: 51-54 | Volume-3 Issue-1, March 2014 | Retrieval Number: A0993033114/2014©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Ubiquity and speed of email have made it increasingly effective to look in to the security aspect. Providing reliance over this medium has become an inevitable requirement and security has been a growing concern over the past few years. The average individual, who uses e-mail, naively believes that their e-mail is private and secure. The electronic world is filled with snoopers who can access all types of data over the network. In secure email and other secure communication, there is a major problem of key management. As the world goes digital, with more and more raw information about individuals available electronically, the need for security with hassle free key management increases. The emails of today are secured by encrypting the content on an external medium and sending this as an attachment over the mail. The paper discusses the implementation of providing security using any public identity information of the recipient and authenticating using cryptoki standard E-Token. Identity Based Encryption is a public-key cryptography which uses unique or exclusive data about the identity of an email client or a recipient to encrypt the data and later generates a public key corresponding to that unique/exclusive information. The unique information about the recipient can be his/her’s email address in congregation with his mobile number or Social Security number. All these become parameters to create the public key. Time Stamp can also be incorporated to above parameters to create the public key. IBE is subset of larger set ABE (Attribute based Encryption) were one can enable automatic encryption of messages based on the attributes one chooses. The message gets decrypted on the recipient system regardless of the operating system. There are other systems that provide specific security but are strongly tied to the mail servers and browsers. A browser-based method allows the recipient to decrypt and read the secure message.
Keywords: Encryption, Decryption, IMAP4, SMTP, Symmetric key, Block cipher, key, variable key, E Token, Cryptoki, Identity Based Encryption
Scope of the Article: Encryption Methods and Tools