ABSTRACT
In the communication age, people constantly uses communication tools such as email for sharing data or communicate to each other. This communication tool use internet to transmit data over the network. However, the increasing of internet usage causes security problems become more important year by year. The problem is the content of data might be stole or changed by the attackers during data transmission from sender to receiver. The secure email application is designed to protect sensitive data from unauthorised users. Hence, Advance Encryption Standard (AES) algorithm is used to ensure secure email communication and the content of email completely unreadable to anyone who does not have the decryption key. This project is expected to maintain the confidentiality of data by encrypting and decrypting email successfully.
INTRODUCTION
Encrypted email is referring to email encryption. The email is encrypt for sharing data or communicate to each other over internet. It is prevent the attackers from steal or make changes to the email contents and to ensure safety communication via secure channel between sender and receiver. The attackers may not be read and understand to the email contents during data transmission because it is encrypted and they does not possess decryption key to decrypt.
The AES algorithm is used to encrypt the content of email during transmission. This encryption algorithm is called as symmetric key in which the encryption and decryption process are using the same key.
The AES algorithm is used to encrypt the content of email during transmission. This encryption algorithm is called as symmetric key in which the encryption and decryption process are using the same key.
OBJECTIVES
1. To propose a secure email message application
|
2. To design email encryption to protect sensitive data from unauthorized users
|
3. To implement AES algorithm for encrypting email message
|
METHODOLOGY
1. Generate RSA private key and public key.
2. Use AES 128 to protect RSA key pairs with passphrase.
1. Server sends a copy of its asymmetric public key.
2. Browser creates a symmetric session key and encrypts it with the server's asymmetric public key. Then, sends it to the server.
3. Server decrypts the encrypted session key using its asymmetric private key to get the symmetric session key.
4. Server and Browser encrypt and decrypt all transmitted data with the symmetric session key.
RESULT
CONCLUSION
Encryption is important when sensitive data is transmitted over the network.
|
|