[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Privacy enhanced mail design and implementation perspectives

Published: 01 July 1994 Publication History

Abstract

The introduction of public key crypto-systems has opened the way to using security in distributed applications without imposing huge management overhead. Electronic mail is one area where security is important. Privacy Enhanced Mail is emerging as a de-facto international standard for the interchange of secure e-mail.This paper discusses some of the current problematic issues of PEM and introduces a PEM User Agent developed to test some of its concepts. A number of PEM design and implementation issues are explained and a conclusion on the future directions of PEM and other related work is given.

References

[1]
[Biham and Shamir, 1993] E. Biham and A. Shamir. Differential cryptanalysis of the data encryption standard. Springer-Verlag, 1993.
[2]
[Borenstein and Feed, 1992] N. Borenstein and N. Feed. Request for comments 1341, MIME (multi-purpose internet mail extensions): Mechanisms for specifying and describing the format of internet message bodies, Technical Report 1341, Internet, June 1992.
[3]
[ISO-500, 1988] ISO-500. The directory -- overview of concepts, models, and services. International standard CCITT X.509, International Standards Organisation, December 1988.
[4]
[ISO-509, 1988] ISO-509. Information processing systems -- open systems interconnection -- the directory -- authentication framework. International Standard 9594 -- CCITT X.509, International Standards Organisation, 1988. Part 8.
[5]
[ISO-8613, 1989] ISO-8613. Information processing -- open systems interconnection -- text and office systems -- office document architecture (ODA) and interchange format (ODIF). International Standard IS-8613, International Standards Organisation, 1989. Parts 1-8.
[6]
[ITU-509, 1993] ITU-509. Information processing systems -- open systems interconnection -- the directory -- authentication framework. International Standard 9594 -- ITU X.509, International Standards Organisation, 1993. Part 8.
[7]
[Kirstein and Williams, 1992] P. T. Kirstein and P. Williams. Piloting authentication of security services within OSI applications for RTD information. Computer Networks and ISDN Systems, 2(5):483-489, 1992.
[8]
[Merkle and Hellman, 1981] Ralph C. Merkle and Martin E. Hellman. On the security of multiple encryption. Communications of the ACM, 24(7):465- 467, July 1981.
[9]
[Peek, 1990] J. Peek. MH and XMH: Email for Users and Programmers. T. O'Reily & Associates, 1990.
[10]
[RFC 1115, 1992] RFC 1115. Request for comments 1113, the md2 message-digest algorithm. Technical Report 1115, Internet, April 1992.
[11]
[RFC1327, 1992] RFC1327. Request for comments 1327, mapping between x.400(1988)/iso 10021 and rfc 822. Technical Report 1327, Internet, May 1992. Replaces RFCs 987, 1206, 1138 and 1148.
[12]
[RFC1421, 1992] RFC1421. Request for comments 1421, privacy enhancement for internet electronic mail: Part I: Message encryption and authentication procedures. Technical Report 1113, Internet, July 1992, replaces 1113.
[13]
[RFC1422, 1992] RFC1422. Request for comments 1422, privacy enhancement for internet electronic mail: Part II: Certificate-based key management. Technical Report 1113, Internet, August 1992. replaces RFC 1113.
[14]
[RFC1423, 1992] RFC1423. Request for comments 1423, privacy enhancement for internet electronic mail: Part III: Algorithms, modes and identifiers. Technical Report 1114, Internet, September 1992. replaces RFC 1114.
[15]
[RFC1424, 1992] RFC1424. Request for comments 1424, privacy enhancement for internet electronic mail: Part IV: Key certification and related services. Technical Report 1114, Internet, September 1992. replaces RFC 1113.
[16]
[RFC821, 1982] RFC821. Request for comments 821, simple mail transfer protocol. Technical Report 821, Internet, August 1982. Replaces RFCs 788, 780, 772.
[17]
[RFC822, 1982] RFC822. Request for comments 822, standard for the format arpa internet text messages. Technical Report 822, Internet, August 1982. Replaces RFC 733.
[18]
[Rose et. al., 1991] M. T. Rose, J. P. Onions, and C. J. Robbins. The ISO Development Environment : User's Manual Volume 1 : Application Services. NeXor Services Ltd, 7.0 edition, July 1991.
[19]
[Rubin, 1987] Frank Rubin. Foiling an exhaustive key search attack. Cryptologia, 11(2):102-107, April 1987.
[20]
[S. Crocker and Rose, 1993] J. Galvin S. Murphy S. Crocker, N. Freed and M. T. Rose. MIME-PEM interaction. Internet draft, Internet, October 1993.
[21]
[S. E. Kille and Turland, 1991] M. Roe S. E. Kille and A. Turland. The ISO Development Environment: User's Manual, 1991. QUIPU.
[22]
[Schiller, 1993] J. I. Schiller. An alternative PEM MIME integration. Internet draft, Internet, October 1993.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 24, Issue 3
July 1994
87 pages
ISSN:0146-4833
DOI:10.1145/193285
  • Editor:
  • David Oran
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1994
Published in SIGCOMM-CCR Volume 24, Issue 3

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)142
  • Downloads (Last 6 weeks)21
Reflects downloads up to 05 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media