Skip to main content

Securing Internet Electronic Mail

  • Chapter
  • First Online:
State of the Art in Applied Cryptography

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1528))

  • 799 Accesses

Abstract

Thanks to the widespread success of the Internet, the use of e-mail has become common practice. More and more people are even using it as a primary means of communication. Unfortunately, regular users are not aware of the risks they are facing. If you send a regular letter, you can rely on the confidentiality of its content but not so with plain e-mail. Each message can be intercepted by a trained computer user connected to the net. Indeed in this paper we will show how easy it is to read other people's e-mail, and even change it without being caught. Thanks to an extensive use of cryptography, we can limit these risks. We will present and analyze an overview of the latest available standards and tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.

    Google Scholar 

  2. International Standards Organization, Digital signature schemes giving message recovery-Part 2: Mechanisms using a hash-function, Draft International Standard ISO/IEC 9796-2, December 1996.

    Google Scholar 

  3. A. S. Tanenbaum, Computer Networks, Prentice Hall, 1996.

    Google Scholar 

  4. International Telecommunication Union-Telecommunications Standardization Sector, The Directory-Authentication Framework, Recommendation X.509, 1996.

    Google Scholar 

  5. RSA Laboratories, Cryptographic Message Syntax Standard, PKCS #7, Version 1.5, November 1993.

    Google Scholar 

  6. D. Crocker, Standard for the Format of ARPA Internet Text Messages, RFC 822, University of Delaware, August 1982.

    Google Scholar 

  7. N. Freed, N. Borenstein, Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies, RFC 2045, Innosoft and First Virtual, November 1996.

    Google Scholar 

  8. J. Galvin, S. Murphy, S. Crocker, and N. Freed, Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted, RFC 1847, TIS and Innosoft, September 1995.

    Google Scholar 

  9. J. Linn, Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures, RFC 1421, IAB IRTF PSRG, IETF PEM WG, February 1993.

    Google Scholar 

  10. S. Kent, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate Based Key Management, RFC 1422, BBN Communications, February 1993.

    Google Scholar 

  11. D. Balenson, Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identfiers, RFC 1423, TIS, February 1993.

    Google Scholar 

  12. B. Kaliski, Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services, RFC 1424, RSA Laboratories, February 1993.

    Google Scholar 

  13. X. Lai, J. L. Massey, and S. Murphy, Markov Ciphers and Differential Cryptanalysis, Advances in Cryptology-EUROCRYPT’ 91, LNCS 547, August 1991.

    Google Scholar 

  14. S. Dusse, S/MIME Message Specification: PKCS Security Services for MIME, Internet Draft, RSA Laboratories, September 1996.

    Google Scholar 

  15. M. Elkins, MIME Security with Pretty Good Privacy (PGP), RFC 2015, Aerospace Corporation, October 1996.

    Google Scholar 

  16. S. Crocker, N. Freed, J. Galvin, and S. Murphy, MIME Object Security Services, RFC 1848, Cybercash, Innosoft and TIS, October 1995.

    Google Scholar 

  17. C. Dinkel (Ed.), Secure Data Network System (SNDS) Network, Transport and Message Security Protocols, U.S. Department of Commerce, National Institute of Standards and Technology, Report NISTIR 90-4250, 1990.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Vandenwauver, M., Jorissen, F. (1998). Securing Internet Electronic Mail. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-49248-8_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65474-2

  • Online ISBN: 978-3-540-49248-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics