New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy

被引:0
|
作者
Lee, Chien-Ding [1 ]
Chen, Tzung-Her [2 ]
机构
[1] Natl Open Univ, Dept Informat & Management, New Taipei 247031, Taiwan
[2] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600355, Taiwan
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 07期
关键词
e-mail protocol; perfect forward secrecy; authenticated key exchange; simple key management; PROVIDING PERFECT; WIDE USE; CRYPTANALYSIS; PROPAGATION;
D O I
10.3390/sym13071144
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The invention of electronic mail (e-mail) has made communication through the Internet easier than before. However, because the fundamental functions of the Internet are built on opensource technologies, it is critical to keep all transmitted e-mail secure and secret. Most current e-mail protocols only allow recipients to check their e-mail after the recipients are authenticated by the e-mail server. Unfortunately, the subsequent e-mail transmission from the server to the recipient remains unprotected in the clear form without encryption. Sometimes, this is not allowed, especially in consideration of issues such as confidentiality and integrity. In this paper, we propose a secure and practical e-mail protocol with perfect forward secrecy, as well as a high security level, in which the session keys used to encrypt the last e-mail will not be disclosed even if the long-term secret key is compromised for any possible reason. Thus, the proposed scheme benefits from the following advantages: (1) providing mutual authentication to remove the threat of not only impersonation attacks, but also spam; (2) guaranteeing confidentiality and integrity while providing the service of perfect forward secrecy; (3) simplifying key management by avoiding the expense of public key infrastructure involvement; and (4) achieving lower computational cost while meeting security criteria compared to the related works. The security analysis and the discussion demonstrate that the proposed scheme works well.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] TRANSPARENT PROXY FOR SECURE E-MAIL
    Michalak, Juraj
    Hudec, Ladislav
    [J]. JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2010, 61 (03): : 183 - 188
  • [22] New certified e-mail protocol based on signcryption
    Zhang, Qing
    Zhang, Long
    Wen, Qiao-Yan
    Chen, Geng-Li
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2008, 37 (02): : 282 - 284
  • [23] Cryptonet:: Secure E-mail system
    Muftic, Sead
    Schmolzer, Gernot
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 84 - 91
  • [24] An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
    Draper-Gil, Gerard
    Ferrer-Gomila, Josep L.
    Hinarejos, M. Francisca
    Tauber, Arne
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 382 - 390
  • [25] New products ensure secure E-mail and file exchange
    不详
    [J]. IEEE INTERNET COMPUTING, 1999, 3 (05) : 12 - 12
  • [26] A study of E-mail marketing: Why do people read and forward e-mail?
    Lu, Hsi-Pen
    Fu, Hsin-Chiau
    Yen, Chia-Hui
    [J]. ADVANCES IN INFORMATION SYSTEMS DEVELOPMENT, VOL 2: NEW METHODS AND PRACTICE FOR THE NETWORKED SOCIETY, 2007, : 239 - 249
  • [27] E-Mail: Building the Perfect In-Box
    [J]. P C Mag Ind ep Guide IBM Stand Pers Comput, 17 (183):
  • [28] A practical guide to the e-mail interview
    Hunt, Nigel
    McHale, Sue
    [J]. QUALITATIVE HEALTH RESEARCH, 2007, 17 (10) : 1415 - 1421
  • [30] An improved e-mail security protocol
    Schneier, B
    Hall, C
    [J]. 13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 227 - 230