ASIA unversity:Item 310904400/10661
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21661207      Online Users : 417
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/10661


    Title: An Efficient E-mail Protocol Using Elliptic Curve Cryptography
    Authors: Shang-Yu Hsu
    Contributors: Department of Computer Science and Information Engineering
    Keywords: Electronic mail (e-mail);elliptic curve cryptography (ECC);Perfect forward secrecy
    Date: 2010
    Issue Date: 2010-11-04 08:16:22 (UTC+0)
    Publisher: Asia University
    Abstract: Electronic mail (e-mail) is one of the most important and widely used network applications. It has been used in communications between individuals, business organizations and governmental agencies around the world. In 2006, Kim et al. proposed two e-mail protocols with perfect forward secrecy. Unfortunately, Yoon and Yoo recently demonstrated that Kim et al.’s second e-mail protocol is insecure under two impersonation attacks, where an attacker can easily impersonate a legal sender in order to send a forged e-mail to a recipient, or and attacker can easily impersonate a legal e-mail server to get all e-mail content sent from senders to recipients.
    However, Yoon and Yoo didn’t propose the improved version for the impersonation attacks. For this reason, the first goal of the thesis is to propose a secure e-mail protocol, which not only can remedy the weakness came from the impersonation attacks, but also can provide the additional functionality by attaching the time-stamp issued by the Time-Stamping Service (TSS). Hence, some time-sensitive e-mail content, typically for e-commerce, intellectual property protection, and records integrity, all benefit from the time-stamping service. In additions, some possible attacks, i.e. delay or replay, can also be eliminated.
    With the rapid development of communication technologies, mobile communication environments are pervasive. Major e-mail providers, such as Gmail, Yahoo, currently provide mobile e-mail services. However, mobile devices are not equipped with sufficient resources to handle the expensive computations required for exploiting PKI. Furthermore, there has been growing interest in executing web-applications on resource-constrained mobile devices via browser-based interface. Therefore, it is necessary to design an efficient and secure e-mail system for mobile applications. According to the point, the second goal of the thesis is to design an efficient e-mail protocol with elliptic curve cryptography (ECC).
    From the viewpoint of the security, these two e-mail systems proposed in this thesis not only can provide perfect forward secrecy but also can withstand variety of well-known attacks. Besides, some basic security requirements, such as non-repudiation, confidentiality, integrity, and authentication, can also be guaranteed. In this way, this model can be put on many deployed popular mobile e-mail services directly. Thus, we thought that this project is important and ought to be examined.
    Appears in Collections:[資訊工程學系] 博碩士論文

    Files in This Item:

    File SizeFormat
    0KbUnknown172View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback