scholarly journals Sistem Keamanan Multi Mail Server dengan Teknik Enkripsi OPENPGP pada Zimbra Exchange Open Source Software

2020 ◽  
Vol 7 (3) ◽  
pp. 493
Author(s):  
Amrul Faruq ◽  
Khaeruddin Khaeruddin ◽  
Merinda Lestandy

<p class="Abstrak">Surat elektronik atau <em>email</em> merupakan media komunikasi yang sangat populer. Untuk mengirim dan menerima email, diperlukan sebuah penyedia <em>(server)</em> yang di dalamnya terdapat layanan <em>email</em>. <em>Zimbra Collaboration Suite (ZCS)</em> merupakan salah satu aplikasi <em>mail server powerfull</em> yang dapat dipergunakan sebagai aplikasi <em>mail</em> <em>server</em> dalam jumlah user puluhan hingga ribuan. Pada penelitian ini, sistem enkripsi pada Zimbra <em>multiple-mail</em> <em>server</em> menggunakan metode OpenPGP  diimplementasikan untuk mengamankan isi <em>email</em> yang dikirim maupun yang diterima, yaitu dengan memanfaatkan <em>public key</em> dan <em>private key</em>. Hasil pengujian menunjukkan metode <em>OpenPGP </em> mampu bekerja dengan baik untuk keamanan sistem pengiriman dan atau penerimaan <em>email</em> pada <em>multi mail server</em>.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Abstract"><em>Electronic mail or e-mail is a very popular communication medium. To send and receive e-mails, a provider (server) is needed in which there is an e-mail service. Zimbra Collaboration Suite (ZCS) is one powerful mail server application that can be used as a mail server application in the number of users from tens to thousands. In this study, the encryption system on the Zimbra multiple-mail server uses the OpenPGP  method to be implemented to secure the contents of e-mails sent and received, namely by using the public key and private key. The test results show that the OpenPGP  method works well for the security of the email sending/receiving system on a multi-mail server.</em></p>

Author(s):  
Kannan Balasubramanian ◽  
M. Rajakani

The concept of Identity Based Cryptography introduced the idea of using arbitrary strings such as e-mail addresses and IP Addresses to form public keys with the corresponding private keys being created by the Trusted Authority(TA) who is in possession of a system-wide master secret. Then a party, Alice who wants to send encrypted communication to Bob need only Bob's identifier and the system-wide public parameters. Thus the receiver is able to choose and manipulate the public key of the intended recipient which has a number of advantages. While IBC removes the problem of trust in the public key, it introduces trust in the TA. As the TA uses the system-wide master secret to compute private keys for users in the system, it can effectively recompute a private key for any arbitrary string without having to archive private keys. This greatly simplifies key management as the TA simply needs to protect its master secret.


Author(s):  
Kannan Balasubramanian ◽  
M. Rajakani

The concept of identity-based cryptography introduced the idea of using arbitrary strings such as e-mail addresses and IP addresses to form public keys with the corresponding private keys being created by the trusted authority (TA) who is in possession of a systemwide master secret. Then a party, Alice, who wants to send encrypted communication to Bob need only Bob's identifier and the systemwide public parameters. Thus, the receiver is able to choose and manipulate the public key of the intended recipient which has a number of advantages. While IBC removes the problem of trust in the public key, it introduces trust in the TA. As the TA uses the systemwide master secret to compute private keys for users in the system, it can effectively recompute a private key for any arbitrary string without having to archive private keys. This greatly simplifies key management as the TA simply needs to protect its master secret.


2008 ◽  
Vol 4 (2) ◽  
pp. 113
Author(s):  
Susanna Spinsante

At present, the electronic mail service is probably the most widespread and commonly used asynchronous way ofexchanging information among people, thanks to its immediacy and easiness of use. Information delivered through E-mail can be sensitive or confidential: ensuring the sender’s identity and providing privacy has become a vital step in stopping spam, fraud and even more serious crimes. To this aim, public entities have adopted Certified E-mail systems to manage secure interactions with citizens.Digital Terrestrial Television introduced new facilities in thetraditional broadcasting environment, and determined the transition of several Electronic based-services to Television basedservices. The availability of commercial Set Top Boxes equipped with network interfaces and smart card readers enables the provisioning of personalized interactive TV services, requiring user’s identification and authentication, that still represent open issues in the TV context. In this paper we discuss the challenges of a Certified E-mail service over Digital Terrestrial Television,and present the case study of the Italian Regione Marche, in which this service is under development to support the remote request of certificates issued by the public administration. In particular, our attention is devoted to user authentication and secure access to the administrative services, addressed through the use of a Regional Service Card, an interactive application, and a centralized authentication framework.


Email, e mail, or e mail, is considered probably the most normally employed solution on the net. Throughout the years, email has developed dramatically, appearing in view that essential process of interaction. Nevertheless as soon as maltreat, the interaction predicated on electronic mail might lift some downsides and in addition detrimental for your organizational security, privateness and know-how confidentiality. There is surely not enough a scheme by which person would in all probability get authenticate, in view that now no manipulate is had with the aid of us on the communications arriving at our mailbox. Due to the fact that these severe challenges, the value of securing age that's soft expertise is apparent and primary. There is undoubtedly a process to preserve our expertise safeguarded a nd locked from any person nevertheless the e-mail that is initial is by means of general public key of the receiver. When have the key that is basic public Sender encrypts the e mail accessory and promises the message to your receiver. The receiver h at the same time the private key related to most of the people- confidential key set which can also be detailed for decrypting the message. The receiver decrypts the components and decodes the message put up aided with the aid of the attachment consequently getting the attachments which can be fashioned. Consequently in this precise procedure protection is offered to mail content.MSA Encrypti utilizing the technique called as mail content encryption. Within our assignment the approach will likely be utilized by means of us uneven key cryptography for the encryption of electronic mail articles. Passwords directed on the records are quite often stored at host phase simply but there would be means that is 1/3 o shop our account password on our platform where we utilize electronic mail individual on &Decrypti on of procedure frequently. Today android becomes a very means which are widespread utilze the web hence we're capable to make use of password kept on our our bodies or cellular to gain access to o ur electronic mail account.


1998 ◽  
Vol 37 (03) ◽  
pp. 247-253 ◽  
Author(s):  
K. Ohe ◽  
S. Kaihara ◽  
T. Kiuchi

AbstractWWW-based user interface is presented for secure electronic mail service for healthcare users. Using this method, communications between an electronic mail (WWW) server and users (WWW browsers) can be performed securely using Secure Socket Layer protocol-based Hypertext Transfer Protocol (SSL-HTIP). The mail can be encrypted, signed, and sent to the recipients and vice versa on the remote WWW server. The merit of this method is that many healthcare users can use a secure electronic mail system easily and immediately, because SSL-compatible WWW browsers are widely used and this system can be made available simply by installing a WWW-based mail user agent on a mail server. We implemented a WWWbased mail user agent which is compatible with PEM-based secure mail and made it available to about 16,000 healthcare users. We believe this approach is effective in facilitating secure network-based information exchange among medical professionals.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1389
Author(s):  
Jiwon Lee ◽  
Jihye Kim ◽  
Hyunok Oh

In public key broadcast encryption, anyone can securely transmit a message to a group of receivers such that privileged users can decrypt it. The three important parameters of the broadcast encryption scheme are the length of the ciphertext, the size of private/public key, and the performance of encryption/decryption. It is suggested to decrease them as much as possible; however, it turns out that decreasing one increases the other in most schemes. This paper proposes a new broadcast encryption scheme for tiny Internet of Things (IoT) equipment (BESTIE), minimizing the private key size in each user. In the proposed scheme, the private key size is O(logn), the public key size is O(logn), the encryption time per subset is O(logn), the decryption time is O(logn), and the ciphertext text size is O(r), where n denotes the maximum number of users, and r indicates the number of revoked users. The proposed scheme is the first subset difference-based broadcast encryption scheme to reduce the private key size O(logn) without sacrificing the other parameters. We prove that our proposed scheme is secure under q-Simplified Multi-Exponent Bilinear Diffie-Hellman (q-SMEBDH) in the standard model.


2021 ◽  
Vol 12 (1) ◽  
pp. 1-11
Author(s):  
Cheman Shaik

In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant. The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration uthority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication. Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication


Author(s):  
Sabitha S ◽  
Binitha V Nair

Cryptography is an essential and effective method for securing information’s and data. Several symmetric and asymmetric key cryptographic algorithms are used for securing the data. Symmetric key cryptography uses the same key for both encryption and decryption. Asymmetric Key Cryptography also known as public key cryptography uses two different keys – a public key and a private key. The public key is used for encryption and the private key is used for decryption. In this paper, certain asymmetric key algorithms such as RSA, Rabin, Diffie-Hellman, ElGamal and Elliptical curve cryptosystem, their security aspects and the processes involved in design and implementation of these algorithms are examined.


Author(s):  
Shadi R. Masadeh ◽  
Walid K. Salameh

This chapter presents a keyless self-encrypting/decrypting system to be used in various communications systems. In the world of vast communications systems, data flow through various kinds of media, including free air. Thus the information transmitted is free to anyone who can peer it, which means that there should be a guarding mechanism so the information is transmitted securely over the medium from the sender to the intended receiver, who is supposed to get it in the first place and deter the others from getting the information sent. Many encryption systems have been devised for this purpose, but most of them are built around Public Key Infrastructure (PKI) wherein public key cryptography, a public and private key, is created simultaneously using the same algorithm (a popular one is known as RSA) by a certificate authority (CA). The private key is given only to the requesting party, and the public key is made publicly available (as part of a digital certificate) in a directory that all parties can access. The private key is never shared with anyone or sent across the medium. All of the commonly used encryption systems exchange keys that need to be generated using complex mathematical operations that take noticeable time, which is sometimes done once, and exchanged openly over unsecured medium. We are proposing an expandable keyless self-encrypting/decrypting system, which does not require the use of keys in order o minimize the chances of breaching data exchange security and enhance the data security of everyday communications devices that are otherwise insecured.


2020 ◽  
Vol 10 (1) ◽  
pp. 25-32
Author(s):  
Harun Mukhtar ◽  
Daniel Adi Putra Sitorus ◽  
Yulia Fatma

Mail server is one of the most widely used server functions in the company. This discusses e-mail itself which can reduce mailing costs, is more efficient than manual communication and can be used as attachments that are useful as a supplement and additional documents related to the contents of e-mail. Zimbra is a mail server application that provides complete features and also makes it easy to install mail server management, also mail server security issues are a factor that must be considered by the system administrator. The security design for e-mail servers addresses the importance of being able to prevent spam e-mail attacks that can fill e-mail servers and make mail server performance faster. Because a good mail server security can optimize the performance of the mail server itself. In this final project, the work and implementation of the zimbra mail server security will be carried out specifically for handling email spam. The zimbra email server will analyze its security against spam email attacks, so that it can function as an email server on the company.


Sign in / Sign up

Export Citation Format

Share Document