Location of Repository

Secure E-Mail Messaging to Selected Group Members Using PGP Technique

By Sachin Tripathi and G. P. Biswas

Abstract

The E-mail messaging is one of the most popular uses of the Internet and the multiple Internet users can exchange messages within short span of time using To(Original recipient),Cc(Carbon Copy) and /or Bcc(Blind Carbon copy) facilities. Although the security of the important E-mail messages is an important issue, no such security is supported by the Internet standards. Recently one well known scheme, called PGP (Pretty Good Privacy) is proposed for personal security of E-mail messages, but it can transmit encrypted message to single recipient only,i.e.,the same encrypted message can not be transmitted to the multiple recipients if Cc and Bcc options are used. This paper proposes two modifications of the PGP that avoid the limitation of the PGP of not transmitting same encrypted message to multiple receipients.The basic idea is that a group comprising To, Cc and Bcc recipients is initially formed, a group key among them is generated using any group key generation scheme, which is then used (instead of the using the public key of the single recipients as done in PGP) to encrypt the session key. Since the secret group key is known to all recipients, they can extract session key and decrypt the confidential message correctly. This is one of the proposed modifications of PGP technique. The other modification is to remove the use of public key cryptosystem in PGP and this is done simply by generating signature of the E-mail message using group key (instead of using the sender‟s private key).It not only increases the processing speed of the PGP, but also simplifies it by avoiding to preserve the private key ring and public key ring of the participants

Topics: Pretty Good Privacy (PGP, CCEGK Group Key Algorithm, Asymmetric and Symmetric Cryptography
Year: 2011
OAI identifier: oai:CiteSeerX.psu:10.1.1.184.5212
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.ijcaonline.org/allp... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.