13-01-2012, 11:56 AM
Email Security
[attachment=16050]
Introduction
Who will choose which security standards to
use? Who will assure that the technology will be
interoperable? Who will decide which records are official
government records? Who will decide what level of
security assurance is adequate for the privacy protection
requirements of different agencies? Who will receive the
interagency funding for implementation [1]?
Proposed Solution:
Compression Algorithm:
Traditional methodology for compressed text or
messages is based on codes. The code book introduced to
compress the letters in word.
Algorithm:
Step 1: Repeat the step 2 to step 3 until message is not
complete.
Step 2: Scan word from message using blank space.
Step 3: Replace with its corresponding code and add to
message.
Step 4: stop
Encryption Algorithm:
Encryption Algorithm is to convert the plaintext
to cipher text, and send the cipher text over
communication channel. The shared secret key is based on
the receiver’s id for Encryption and the key is incremented
by one per letter [3] [11].
Algorithm:
Step 1: Generate key from Receiver’s mail id.
Step 2: Repeat the step 3 to step 4 until compress message
in not complete.
Step 3: Scan letter from compress message and convert it
in cipher text and add to new message.
Step 4: Stop.
Related Work:
In early Email system everyone should encrypt
their e-mail. With identity theft on the rise, should anyone
risk passwords, credit card transactions, Social Security
numbers, and other sensitive information in an e-mail
message? Consider how often transfer companyconfidential
information—salaries, vendor bids, purchase
transactions, and the like—all via e-mail. Yet most e-mail
messages remain unencrypted, even in the face of
increasingly sophisticated hackers bent on pillaging
con¿dential information for their own gain