Essay on Pgp Appliance in Email

3763 Words Aug 27th, 2010 16 Pages
CHAPTER 1
INTRODUCTION

The growth of the Internet is unbelievably rapid, more new devices and services coming out generation by generation. Billions and billions of people are using the Internet and thus internet is becoming one of the most essentialities for nowadays people in the whole world. Of the internet services, electronic mail is the most basic and widely-used services. All email users from any location are communicating each other by sending and receiving email messages over the internet for different purposes. However, email is not a secure method of communication. As email packets have to be routed through many networks over the internet, there grows a large number of longstanding security shortcomings of email
…show more content…
1.3 PGP Security Features PGP provides a variety of security features for electronic mail: • Confidentiality • Authentication • Message Integrity • Non-repudiation of origin Confidentiality protects the contents of the email message by encrypting against the unauthorized disclosure. No one other than the authorized recipient can read the message. Data origin authentication permits the authorized receiver of the message to reliably determine the identity of the sender. Only an authorized receiver can authenticate it. Message integrity provides the authorized recipient of the message assurance that the message has not been altered in transit. The message received that needs to be identical to the message being sent can be verified by using the PGP program. Non-repudiation of the original sender is the feature that allows one person to forward the message to another email user, who can validate the identity of the original sender.

1.4 Benefits of the Proposed System

• As all the algorithms used for message encryption, session-key encryption, hash code generation and hash code encryption are integrated together in the proposed PGP encryption scheme, it eliminates the need for operating multiple, disparate management systems for deploying, managing, and supporting one or more encryption

Related Documents