Dissertation > Excellent graduate degree dissertation topics show

Design of Secure E-mail System Based on Encryption

Author: WangLei
Tutor: DuZhuPing
School: PLA Information Engineering University
Course: Computer Science and Technology
Keywords: Secure e-mail S / MIME Chaotic cryptographic algorithms Elliptic Curve Cryptography CA
CLC: TP393.098
Type: Master's thesis
Year: 2008
Downloads: 40
Quote: 0
Read: Download Dissertation

Abstract


E-mail as a widely used Internet communication technology has been in the life of people occupy a lot of proportion . Current email universal security , however , difficult to be guaranteed , facing middleman humbly received , tampering, repudiation and many other security threats . The main work of this paper is to combine the S / MIME secure e-mail standard , the use of cryptography knowledge design set with confidentiality, integrity and non-repudiation of secure e-mail system . This article uses an improved the chaotic cipher algorithm to encrypt the message content ; elliptic curve cryptosystem design public key cryptographic algorithm , as a basis for digital envelopes and digital signature technology . The use of these cryptographic techniques to ensure the confidentiality, integrity and non-repudiation of e-mail . Article also designed according to the concrete realization of the needs of the system with a public key certification center , the certificate exchange and management ; combined with the S / MIME standard encapsulation process detailed analysis of the e-mail sent and received , the design of the mail proxy function module , and from the theory on the secure e-mail system security . The significance of this paper is that the use of S / MIME standard elliptic curve cryptographic algorithms and an improved the chaotic cipher algorithm introduced the e-mail system to provide users with a practical password-based security e-mail system .

Related Dissertations

  1. Study on Prohexadione Calcium on Growth of Rice and Wheat,S511
  2. Research on the Efficiency of Circle-Flow Constructed Wetland Process for Swine Wastewater Treatment and Zeolite Regeneration,X713
  3. Design on the Individual Cow’s Identification and Position System Based on ZigBee,TN929.5
  4. CA model under the constraint of land sensitivity and scale expansion of city size,F299.2;F224
  5. Research of Centralized Authentication Base on SAML and Implementation in Digital Campus,TP393.18
  6. Study on the Preparing of KGM-PVA/CA Adhesive,TQ437
  7. Design and Implementation of Network Secure Infrastructure in National Audit System,TP393.08
  8. Jilin Daily, digital asset management system,TP311.52
  9. Preparation of high-sulfur coal gangue sintered hollow brick technology research,TD849.5
  10. Research and Realize Area Controller’s Key Technology Based on JDF/JMF,TP273
  11. Construction of private key distribution and user encryption and authentication center VoIP systems,TN918.73
  12. Combination of public key cryptosystem key management center Research and Implementation,TP393.08
  13. The X-ray Spectrum Analysis of the Calcium and Phosphorus Elements of Growing Rat’s Condyle After Mandibular Protrusion,R783.5
  14. Research and Application of SSL in Automatic Test System Based on LXI Bus,TP393.08
  15. Galvanized plate modified calcium phosphate coatings research,TG174
  16. Information-oriented physical systems IEEE802.15.4MAC protocol analysis and optimization,TP212.9
  17. Research of Multi-digtal Signature Scheme Based on Elliptic Curve,TN918.1
  18. Research and Application of CA Authentication System Based on Elliptic Curve,TP393.08
  19. Investigation of Lysosome Cathepsin B Induced Apoptosis After Cerebral Ischemia-reperfusion Injury in Rats and the Effects of CA-074Me,R741
  20. The Space-time Simulation of Land Use Evolution in Daqing City Center,TU984.113

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > The application of computer network > E-mail ( E -mail )
© 2012 www.DissertationTopic.Net  Mobile