Home | Issues | Profile | History | Submission | Review
Vol: 4(4) No: 1 / March 1994      

Security Solutions for E-mail Transmissions in Computer Networks
Victor-Valeriu Patriciu
Computer Science Department, Technical Military Academy, Bucharest, Bd. G. Cosbuc, Nr. 81-83, Sect. 4, Bucharest, Romania, e-mail: aionescu@roearn.ici.ro


Keywords: e-mail, security solutions, computer networks

Abstract
Recent network survey information has shown that over 80% of people who use computer networks, use then for electronic mail (email) or for file transmission. Unfortunately, while this information technology is fast and easy to use, it is equally fast and easy for just about anyone with a computer to read, alter, and forge those documents-all quite undetectable. This paper present some cryptographic solutions for guarantee the confidentiality and authenticity of messages transmitted by email in national and international computer network.

References
[1] Muftic S., “Security Mechanisms For Computer Networks”, Proj. Rep. CEC COST-11, 1990.
[2] Patriciu V. V., “Data Security in Distributed Systems “, Doctoral Thesis Polytechnical University Bucharest, 1992.
[3] Patriciu V. V., “Cryptography and Security in Computer Networks”, Editura Tehnica, 1994.
[4] Kent S., “Internet Privacy Enhanced Mail”, CACM, aug, 1994.
[5] RFC 1341, Multipurpose Internet Mail extantion, may, 1992.
[6] RFC 1421, PEM for Internet, Part I: Message encipherment and authentication procedure, feb. 1993.
[7] RFC 1422, PEM for Internet, Part II: Certificate-based key Management, Feb. 1993.
[8] RFC 1423, PEM for Internet, Part III: Algorithms, modes and idintefiers, Feb. 1993.
[9] RFC 1424, PEM for Internet, Part IV: Key certification and relatedservices, Feb. 1993.
[10] RSA Data Security, INC., “The Keys to Privacy and Authentication”, Products Catalog, Redwoods City, USA, 1992.