Browse > Article
http://dx.doi.org/10.9728/dcs.2017.18.7.1403

Implementation of Encrypted Mail Program using SMTP and POP3  

Kong, Keon-Woong (Department of LG Smart Convergence Engineering, Chonnam National University)
Won, Yonggwan (School of Electronics and Computer Engineering, Chonnam National University)
Publication Information
Journal of Digital Contents Society / v.18, no.7, 2017 , pp. 1403-1409 More about this Journal
Abstract
As the Internet evolves, security becomes more important. Especially, e-mail has become one of the most important services that companies and ordinary users use on the Internet. However, security vulnerabilities such as sniffing attacks, IDs, and password spoofs are causing many problems. This paper introduces an example of implementation of encrypted mailing program with which the secured mail is encrypted by symmetric key methode and the encrypted message can not be read without proper decryption. In order to use the current mailing systems, we keep the rules related to SMTP and POP3, and only the encrypted message is stored in the mail server system and the message can be decrypted only at the terminals of the senders and the receivers with the key which is shared in advanced by independent route between them. This implementation scheme can provide an efficiency that it does not request any change of current mailing system, which can be an additional security protection.
Keywords
Decryption; Encryption; Mail; POP3; SMTP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 wikipedia, SMTP (Simple Mail Transfer Protocol)[Internet], Available: https://ko.wikipedia.org/
2 Ki-Hyun Park, Data communication and computer network, Hanbit Academy, 2013.
3 Young-Jong Kim, "A Distributed Architecture based SMTP Server for Large Email Service", The Journal of Information Processing Society, Vol. 16-C, No. 5, pp.597-604, 2009.
4 Jum-Gu Kim, "Design of secure electronic mail system for information protection services", The Journal of Narnseoul Univ, Vol. 5, pp.84-95, 1999.
5 Myers, Rose, Post Office Protocol - Version 3, IETF, RFC 1725, 1995
6 Jong-Hee Kim, "Development of the Secure-POP3 using the Encryption of Account Information", The Journal of Information Science Society, Vol. 3, No. 6, pp.708-713, 1997.
7 Korea Information Technology Association, http://www.tta.or.kr/.
8 Hyun-Mi Park, Network Sniping Technology and Prevention Measures, https://www.linux.co.kr/security/certcc/tr2000-07.htm/.
9 Gil-Hyun Nam, "A Study on the Crypto-complexity of DES and A Proposal of Extended DES-like Cryptographic Algorithm", The Journal of Korea Communications Information Society, Vol. 3. No. 2, pp.3-15, Dec 1993.
10 Ho-Shin Na, Study on comparison of DES and SEED, Master, Dong-guk University, Seoul, 1999.
11 Dae-Il Yang, Information Security Initiative : Everything You Learn About One Piece Of Security Theory, Hanbit Academy, 2013.
12 PMG Knowledge engine laboratory, A dictionary of common events, ParkMoonGak.