Loading

Developing a Model to Enhance E-Mail Authentication against E-Mail Address Spoofing using Application
A. S. Zadgaonkar1, Vikas Chandra Pandey2, Pratap Singh Pradhan3

1Dr. A.S. Zadgaonkar, Vice Chancellor, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.), India.
2Vikas Chandra Pandey, Assistant Professor, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.), India.
3Pratap Singh Pradhan, Research Scholar, Dr. C. V. Raman University, Kargiroad, Kota, Bilaspur, (C.G.), India.
Manuscript received on May 05, 2013. | Revised Manuscript received on May 11, 2013. | Manuscript published on May 15, 2013. | PP: 13-17 | Volume-1 Issue-6, May 2013. | Retrieval Number: F0290051613/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: E-mail is one of the most commonly used communication mechanisms. Most of the recipients and senders desire secure e-mail exchange. Senders want to make sure that the recipient is really the intended recipient, and the message arrives to the recipient confidentially. On the other hand, recipients want to make sure that the sender is the entity who it claims to be, and the arrived message has not been maliciously modified and examined during transmission. These requirements can be satisfied by the e-mail applications that use public key cryptosystem (PKC) as the security base, such as S/MIME and PGP. The main handicap behind the deployment of applications that use PKC is the problem of public key distribution with a legitimate binding with its owner. Moreover, public key management features, such as update, delete operations must be performed in a secure way.
Keywords: MIME, PKC, threats, attack, Internet, Spam, software.