edf40wrjww2CF_PaperMaster:Desc
TABLE OF CONTENT
Introduction 3
Message sending process? 3
Receive message and decrypt 3
Protocol - what the protocol are designed to achieve 4
IMAP 4
POP3 4
SMTP 4
HTTP 4
Hardware/Software 4
Hardware 4
Software 4
Application, Network, and Transport protocols used 6
Transport Protocol 6
Encryption/Decryption process 6
Sending Public-Key Encrypted Mail 6
Receiving Public-Key Encrypted Mail 7
Why the Integrity of the Public Key is Essential 7
Conclusion 7
Reference: 8
Introduction
Ulysses (user) - sends email and attachment using private key encryption to send it from LAN to LAN.From the user standpoint, email seems so simple. You select the address of the person to whom you want to send the email, compose your message and click 'Send'. All done
In reality, sending your message off into the network cloud is a bit like sending Little Red Riding Hood into the deep dark woods. You never know what might happen.
Ulysses sends an email and an image which classes as an attachment to the email, when sending the email the user uses private key encryption to send the email to another user. A private key is used for generating digital signatures and for decrypting data. Also use for authentication, data encryption/decryption, digital signing, and secure e-mail.
Message sending process?
Once user send ...