Open Access Open Access  Restricted Access Subscription or Fee Access

A Review of Research on Email Security Protocols

Abhishek Dadhich

Abstract


Email is the most widely recognized approach to impart today. Email is utilized for sending instant messages and to send connection, sounds, and recordings. For business information, exchange email is the main means. It is the most common way to communicate over internet with different people all over the world. In addition, it has had disadvantages like cybercrime, people can use this means of communication for sending false mails spam, dangers, Phishing-messages and proliferating destructive programming like worms and infection and some more. So, it is important to secure the email system and take required measures to solve them by following certain protocols and punishing the criminal under the law court. This review paper contains the working of the email system used currently and the security protocols used to secure the email communication system. Security protocols are short programs aiming at securing communications over a network. They are widely used in our everyday life. They may achieve various goals depending on the application: confidentiality, authenticity, privacy, anonymity, fairness, etc.


Keywords


Email, Email Structure, Email Protocol, Security Conventions, Email Security Protocol

Full Text:

PDF

References


Behrouz A Forouzan, Data Communications and Networking. New Delhi: Tata McGraw-Hill, 2011.

Sunny gill, Gaurav Rupnar, Vaibhav Ramteke, Dipti Patil and Vijay M.Wadhai, "Email Security Protocol", International Journal of Computer Trends and Technology- March to April Issue 2011.

Justin Paglierani, Mike Mabey, Gail-Joon Ahn, “Towards Comprehensive and Collaborative Forensics on Email Evidence”, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2013.

RadicatiGroup,Inc.,“EmailMarket,2012-2016,” http://www.radicati.com/wp/wpcontent/uploads/2012/04/Email-Statistics-Report-20122016-Executive-Summary.pdf, October 2012.

.

Suresh Kumar B., Jagathy Raj V. P., "A Secure Email System Based on IBE, DNS and Proxy Service", Journal of Emerging Trends in Computing and Information Sciences, Vol. 3, No. 9, Sep. 2012.

William Stallings, "Cryptography and Network Security Principles and Practice", Fifth Edition, 2011.

Apeksha Nemavarkar, Rajesh Kumar Chakrawarti, 2015. "A uniform approach for multilevel Email security using image authentication, compression, OTP & cryptography". In Proceedings of the IEEE International Conference on Computer, Communication and Control IC4.

R. Chandramouli, S. Garfinkel, S. Nightingale, and S. Rose. Trusted Email. SECOND DRAFT NIST SpecialPublication 800-177, March 2018. https://csrc.nist.gov/publications/detail/sp/800-177/rev-1/draf.

Duckett, Chris. (2018, February 26). Australian decryption legislation will not undermine ‘legitimate encryption’: Home Affairs, March 2018. http://www.zdnet.com/article/australian-decryption-legislation-will-not-undermine-legitimate-encryption-home-affairs/

Coons, Christopher. (2009, February 20). Digital Signatures on Email Now a DoD Requirement, March 2018.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Trends in Opto-Electro and Optical Communications