Networking

edf40wrjww2CF_PaperMaster:Desc
TABLE OF CONTENT

Introduction    3
Message sending process?    3
Receive message and decrypt    3
Protocol - what the protocol are designed to achieve    4
IMAP    4
POP3    4
SMTP    4
HTTP    4
Hardware/Software    4
Hardware    4
Software    4
Application, Network, and Transport protocols used    6
Transport Protocol    6
Encryption/Decryption process    6
Sending Public-Key Encrypted Mail    6
Receiving Public-Key Encrypted Mail    7
Why the Integrity of the Public Key is Essential    7
Conclusion    7
Reference:    8

Introduction

Ulysses (user) - sends email and attachment using private key encryption to send it from LAN to LAN.From the user standpoint, email seems so simple. You select the address of the person to whom you want to send the email, compose your message and click 'Send'. All done
In reality, sending your message off into the network cloud is a bit like sending Little Red Riding Hood into the deep dark woods. You never know what might happen.
Ulysses sends an email and an image which classes as an attachment to the email, when sending the email the user uses private key encryption to send the email to another user. A private key is used for generating digital signatures and for decrypting data. Also use for authentication, data encryption/decryption, digital signing, and secure e-mail.
Message sending process?
Once user send ...
Word (s) : 1603
Pages (s) : 7
View (s) : 629
Rank : 0
   
Report this paper
Please login to view the full paper