Browse > Article

Design and Implementation of a Client Mail Security System for Secure Mail Exchange using Public Key Infrastructure  

정창렬 (순천대학교 컴퓨터과학과)
고진광 (순천대학교 컴퓨터과학과)
Abstract
Recently, the Internet enhanced by development of IT makes the processing and exchanging of information, As the Internet is sending and receiving digitized documents over the Internet e-mail system. The security of document information is being threated when exchanging digitized documents over an open network such as the Internet. The degree of threat is even higher when sensitive documents are involved Therefore, in this paper, the secure e-mail system on a client is designed and implemented in order to make secure exchanging of digitized documents. By using the public key infrastructure in which encrypted mail transmission, proof of delivery and integrity of the message are garanted, unauthorized manipulation, illegal acquisition and mutual authentication problem can be prevented in order to secure the document information which is crucial and sensible when exchanging the digitized document over the Internet. Futhenmore, by using the SET protocol based on public key cryptography, the secure mail system is designed and implemented in order for the users not having any professional knowledge to deal with the system easily and friendly in GUI environment.
Keywords
공개키;메일시스템;SET프로토콜;공개키 기반구조;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jonathan B. Postel. 'SIMPLE MAIL TRANSFER PROTOCOL', http://www.cis.ohiostate.edu/rfc/rfc0821.txt
2 IAIK Library JCE. http://jcewww.iaik.tu-graz.ac.at/
3 R. L. Rivest, A. Shamir, and L. Adlman, 'A Method for Obtaining Digital Signatures and Public-key Cryptosystems', ACM, Vol.21, No. 2, pp.644-654, Feb. 1987
4 Matsui, M., 'Linear Cryptanalysis Method DES cipher', Advanced in crtpyology-EUROCRYFT '93, LNCS 765, 1994
5 M. Myers, C. Adams, D. Solo, and D. Kemp, Rfc 2511, 'Internet X.509 Certificate Request Message Format', IETF X.509 PKI(PKIIX) Working Group., March, 1999
6 T. ElGamal, 'A Public Key Cryptosystem and a Signature Scheme based on Discrete Algorithm', IEEE Trans. Information Thory, VIT-22, NO.6, Nov. pp.654-664, 1976
7 Matt B, Joan F, and Jack L. 'Decentralized trust management. In Proc. 1996 IEEE Symposium on Security and Privacy, 1996
8 이만영외 '전자상거래 보안기술',생능출판사,2000
9 Williarn S., 'S/MIME : E-Mail Gets secure', 1998
10 N. A. Nazario, 'CA-browsing System-A Supporting Application for Global Security Services', ISOC Symposium on Network and Distributed System Security, SanDiego, pp.123-128, Feb. 1994
11 J. G. Koh, T. H. Kim, C. R. Jung, et.,'Implementation of Cipher-mail System using SET Protocol in Clients', Proceeding of the International Conference on Parallel and Distributed Proc. Techniques and Application, PDPTA'2001, Las vegas, Nevada, 25-26, June, 2001
12 반용호, 홍주형, 김종훈, 'PKI기반 전자거래를 위한 공개키 인증시스템 설계 및 구현 동아대학교 부설 정보기술연구소 논문집 Vol.8, No.1, pp.131-139, 2000
13 Jonathan K., 'JAVA Cryptography', O'Reilly & associate,Inc, 1998