New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy

被引:0
|
作者
Lee, Chien-Ding [1 ]
Chen, Tzung-Her [2 ]
机构
[1] Natl Open Univ, Dept Informat & Management, New Taipei 247031, Taiwan
[2] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600355, Taiwan
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 07期
关键词
e-mail protocol; perfect forward secrecy; authenticated key exchange; simple key management; PROVIDING PERFECT; WIDE USE; CRYPTANALYSIS; PROPAGATION;
D O I
10.3390/sym13071144
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The invention of electronic mail (e-mail) has made communication through the Internet easier than before. However, because the fundamental functions of the Internet are built on opensource technologies, it is critical to keep all transmitted e-mail secure and secret. Most current e-mail protocols only allow recipients to check their e-mail after the recipients are authenticated by the e-mail server. Unfortunately, the subsequent e-mail transmission from the server to the recipient remains unprotected in the clear form without encryption. Sometimes, this is not allowed, especially in consideration of issues such as confidentiality and integrity. In this paper, we propose a secure and practical e-mail protocol with perfect forward secrecy, as well as a high security level, in which the session keys used to encrypt the last e-mail will not be disclosed even if the long-term secret key is compromised for any possible reason. Thus, the proposed scheme benefits from the following advantages: (1) providing mutual authentication to remove the threat of not only impersonation attacks, but also spam; (2) guaranteeing confidentiality and integrity while providing the service of perfect forward secrecy; (3) simplifying key management by avoiding the expense of public key infrastructure involvement; and (4) achieving lower computational cost while meeting security criteria compared to the related works. The security analysis and the discussion demonstrate that the proposed scheme works well.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Towards a secure e-mail protocol with perfect forward secrecy
    Li, Qi
    Wu, Jian-Ping
    Xu, Ming-Wei
    Xu, Ke
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (10): : 2302 - 2308
  • [2] A practical way to provide perfect forward secrecy for secure e-mail Protocols
    Kim, Sangjin
    Lee, Changyong
    Kim, Daeyoung
    Oh, Heekuck
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2007, 4882 : 327 - +
  • [3] A new protocol of wide use for e-mail with perfect forward secrecy
    Tzung-her Chen
    Yan-ting Wu
    [J]. Journal of Zhejiang University SCIENCE C, 2010, 11 : 74 - 78
  • [5] A new protocol of wide use for e-mail with perfect forward secrecy
    Tzung-her CHEN
    [J]. Journal of Zhejiang University-Science C(Computer & Electronics), 2010, 11 (01) : 74 - 78
  • [6] A new protocol of wide use for e-mail with perfect forward secrecy
    Chen, Tzung-her
    Wu, Yan-ting
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (01): : 74 - 78
  • [7] Secure e-mail protocols providing perfect forward secrecy
    Sun, HM
    Hsieh, BT
    Hwang, HJ
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (01) : 58 - 60
  • [8] An efficient e-mail protocol providing perfect forward secrecy for mobile devices
    Chang, Chin-Chen
    Lee, Chia-Yin
    Chiu, Yen-Chang
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2010, 23 (12) : 1463 - 1473
  • [9] Robust e-mail Protocols with perfect forward secrecy
    Kim, Bum Han
    Koo, Jae Hyung
    Lee, Dong Hoon
    [J]. IEEE COMMUNICATIONS LETTERS, 2006, 10 (06) : 510 - 512
  • [10] Cryptanalysis of e-mail protocols providing perfect forward secrecy
    Phan, Raphael C. -W.
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 101 - 105