Preview

Secured Mail Through Pgp Mail Gateway

Powerful Essays
Open Document
Open Document
3611 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Secured Mail Through Pgp Mail Gateway
Secured Mail through PGP Mail Gateway
L.S Haturusinha, Y.Y Landersz, A.U.H Gamage, P.N Pathiranage, G.T.D Rodrigo, M.P.A.W. Gamage

Sri Lanka Institute of Information Technology

pgpgateway@gmail.com, anjalie.g@sliit.lk

Abstract - PGP Mail Gateway is a backend server which acts like a gateway for mail encryption and decryption with digital signature using industry standards available on open source environment. It is designed to be deployed even on an existing mail server or as a separate backend service where it will provide email security through GPG (open source version of PGP) encryption. Therefore this system will not route emails but will handle only email encryption and decryption. PGP Mail Gateway will serve the purpose of providing email security to a business entity which requires a low cost but highly secure solution with user interactivity kept at a minimum.

Keywords- PGPMG - PGP Mail Gateway, RFC – Request for Comments, Cryptography - is the practice and study of techniques for secure communication, Cypher text – text with cryptography applied on them , Encryption – turning plain text in to cypher text, Decryption, SMTP – Simple Mail Transfer Protocol. I. INTRODUCTION

Email is apparently the most popular mode of communication in the world. An email is considered an open postcard which traverses through internet where anyone can read it. Thus, it goes through an unprotected network before it reaches the destination. Several RFCs on enhancing the privacy of emails have been put forward by different groups in order to bring more secure platform to the user [1].

However, several cryptographic methods are available such as symmetric-key encryption, Caesar’s cipher and public key cryptography [2]. By using these methods several data encryption methods have been implemented.

A. Pretty Good Privacy (PGP) This data encryption and decryption program is often used for signing, encrypting, decrypting texts, files, etc… PGP



References: 1] M.Brinkers, “Why You Should Encrypt Your Email”, djigzo.com, para.3, Jan. 14, 2011. [online]. Available: http://www.djigzo.com/. [Accessed Feb. 22, 2011]. 2] Network Associates, “How PGP Works”, pgpi.org, 1990-1999, [online]. Available: http://www.pgpi.org/doc/pgpintro/. [Accessed Feb. 19, 2011]. 3] Admin, “PGP Universal Gateway Email”, Symantec.com, para.1, 1995-2011, [online]. Available: http://www.symantec.com/business/universal-gateway-email. [Accessed Feb. 25, 2011]. 4] Admin, “Z1 SecureMail Gateway”, freshmeat.net, para.1, Feb. 03, 2011. [online]. Available: http://freshmeat.net/projects/z1securemailgateway/. [Accessed Feb. 22, 2011].

You May Also Find These Documents Helpful

  • Satisfactory Essays

    External Mail Services

    • 536 Words
    • 3 Pages

    Internal mail services are used to communicate within the council which is free of charge and a lot quicker.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The GNU Privacy Guard (GnuPG) is GNU 's tool for secure communication and data storage. It can be used to encrypt data, create digital signatures, and help authenticating using Secure Shell and to provide a framework for public key cryptography. It includes an advanced key management facility and is compliant with the OpenPGP and S/MIME standards. Gpg4win is GNU Privacy Guard for Windows and Kleopatra is the certificate manager in Gpg4win. To create OpenPGP and X.509 certificates, Gpg4win uses a key length of 2048bit by default. The default algorithm for signing and encrypting is RSA. [1]…

    • 987 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 210 handling mail

    • 510 Words
    • 3 Pages

    Mail may have confidential information. It may include personal information about employees or contain business secrets such as the names of customers and confidential information related to the business, customers and clients. Also, mails and packages have to be checked for suspicious features. So security procedures will have to be followed while dealing with mails and packages.…

    • 510 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    You are going to allow your remote users to relay mail via your mail server across the internet, as this will encrypt the username and…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Lab 2 Assessment

    • 492 Words
    • 2 Pages

    If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet?…

    • 492 Words
    • 2 Pages
    Good Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    PIM Internet Business Associate v2.0, Lesson 7: Business E-Mail and Personal Information Management, section "Personal Information Management (PIM)."…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Better Essays

    “Electronic mail, sometimes called email, is a computer based method of sending messages from one computer user to another. These messages usually consist of individual pieces of text which you can send to another computer user even if the other user is not logged in (i.e. using the computer) at the time you send your message.” (University of Birmingham, 2000). When a business sends an e-mail to another business either to conduct continual business or begin new business, the company receiving the e-mail can save the message as hard proof and keep an ongoing file for record purposes.…

    • 1145 Words
    • 5 Pages
    Better Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy is a much required freedom needed to be adopted and practiced in our modern society. From the tycoons in Wall Street to our own Electronic Mail, disclosure of personal information should be stopped and eluded for one's own benefit. While surfing through one self's mail, it is very common that he or she might encounter numerous Spam mails about "Easy Diets" or the famed "Free Ipad" which has perhaps become a cliché by now. One might even occasionally sight the name or the address of the user himself. This rouses a sense of insecurity and anxiety about the other specifics the "sender" has held which can be used against one. The details might vary from Monetary hacking through Credit Card Numbers to Piracy. Such problems need the immediate attention of the cyber police to maintain a more sound and assured environment for the users of the Internet.…

    • 435 Words
    • 2 Pages
    Good Essays

Related Topics