Perfect-Mail: A Secure E-mail Protocol with Perfect Forward Secrecy

Kang, Baoyuan and Xu, Danhui (2016) Perfect-Mail: A Secure E-mail Protocol with Perfect Forward Secrecy. British Journal of Mathematics & Computer Science, 12 (5). pp. 1-11. ISSN 22310851

[thumbnail of Kang1252015BJMCS21889.pdf] Text
Kang1252015BJMCS21889.pdf - Published Version

Download (204kB)

Abstract

With the rapid development of Internet, e-mail has become an essential communication tool. But, the security of e-mail communications is an important issue. Recently, Chen et al. [6] proposed a new protocol of wide use for e-mail. Chen et al. claimed that the proposed protocol is skillfully designed to achieve perfect forward secrecy and end to end security as well as to satisfy the requirements of confidentiality, origin, integrity and easy key management. But, in this paper, we show that Chen et al.’s protocol suffers from the e-mail server impersonation attack, mail content confidentiality attack and replay attack. Moreover, we give an improvement on Chen et al.’s protocol to overcome its security weaknesses, and propose the perfect-mail, a secure e-mail protocol with perfect forward secrecy. It is concluded by analysis that the improved protocol provides the perfect forward secrecy and resists replay attack, impersonation attack, and mail content confidentiality attack. But the communication cost of improved protocol is equal to that of Chen et al.’s protocol, and the computing cost of improved protocol is only added by two signature verification.

Item Type: Article
Subjects: Pustaka Library > Mathematical Science
Depositing User: Unnamed user with email support@pustakalibrary.com
Date Deposited: 29 May 2023 05:37
Last Modified: 12 Jan 2024 07:36
URI: http://archive.bionaturalists.in/id/eprint/1007

Actions (login required)

View Item
View Item