Email Security
#1

Email Security

[attachment=16050]
Introduction
Who will choose which security standards to
use? Who will assure that the technology will be
interoperable? Who will decide which records are official
government records? Who will decide what level of
security assurance is adequate for the privacy protection
requirements of different agencies? Who will receive the
interagency funding for implementation [1]?


Proposed Solution:
Compression Algorithm:
Traditional methodology for compressed text or
messages is based on codes. The code book introduced to
compress the letters in word.
Algorithm:
Step 1: Repeat the step 2 to step 3 until message is not
complete.
Step 2: Scan word from message using blank space.
Step 3: Replace with its corresponding code and add to
message.
Step 4: stop


Encryption Algorithm:
Encryption Algorithm is to convert the plaintext
to cipher text, and send the cipher text over
communication channel. The shared secret key is based on
the receiver’s id for Encryption and the key is incremented
by one per letter [3] [11].
Algorithm:
Step 1: Generate key from Receiver’s mail id.
Step 2: Repeat the step 3 to step 4 until compress message
in not complete.
Step 3: Scan letter from compress message and convert it
in cipher text and add to new message.
Step 4: Stop.


Related Work:
In early Email system everyone should encrypt
their e-mail. With identity theft on the rise, should anyone
risk passwords, credit card transactions, Social Security
numbers, and other sensitive information in an e-mail
message? Consider how often transfer companyconfidential
information—salaries, vendor bids, purchase
transactions, and the like—all via e-mail. Yet most e-mail
messages remain unencrypted, even in the face of
increasingly sophisticated hackers bent on pillaging
con¿dential information for their own gain
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar topics on email security, email security breach, security protocols in email, email security best practices, email security basics, seminar topic on security on email, transport layer security email,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless LAN Security FULL REPORT seminar details 3 5,141 06-11-2014, 09:23 PM
Last Post: seminar report asees
  GSM Based Home Security System details seminar paper 1 1,975 14-11-2012, 12:29 PM
Last Post: seminar details
  DESIGN AND IMPLEMENTATION OF LASER BASED HOME SECURITY SYSTEM seminar addict 1 2,378 22-10-2012, 02:29 PM
Last Post: seminar details
  BLUETOOTH SECURITY ppt seminar paper 1 2,718 08-10-2012, 03:08 PM
Last Post: seminar details
  Computer Security Pretty Good Privacy seminar details 0 996 09-06-2012, 04:22 PM
Last Post: seminar details
  An Iris Recognition System to Enhance e-security seminar details 0 902 08-06-2012, 05:23 PM
Last Post: seminar details
  CELL PHONE VIRUS AND SECURITY ABSTRACT seminar details 0 1,069 06-06-2012, 11:39 AM
Last Post: seminar details
  SECURITY and PRIVACY IN WIRELESS LAN seminar details 0 800 05-06-2012, 05:57 PM
Last Post: seminar details
  Security Watching All the Time ppt seminar details 0 886 05-06-2012, 01:10 PM
Last Post: seminar details
  Potential Threats to Mobile Network Security project uploader 0 861 04-06-2012, 03:53 PM
Last Post: project uploader

Forum Jump: