Bavarian DPA takes tough line on email encryption

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lightweight Encryption for Email

Email encryption techniques have been available for more than a decade, yet none has been widely deployed. The problems of key generation, certification, and distribution have not been pragmatically addressed. We recently proposed a method for implementing a Lightweight Public Key Infrastructure (PKI) for email authentication using recent developments in identitybased cryptography and today’s e...

متن کامل

Mobile Encryption Gateway (MEG) for Email Encryption

Email cryptography applications often suffer from major problems that prevent their widespread implementation. MEG, or the Mobile Encryption Gateway aims to fix the issues associated with email encryption by ensuring that encryption is easy to perform while still maintaining data security. MEG performs automatic decryption and encryption of all emails using PGP. Users do not need to understand ...

متن کامل

Email Encryption using RC4 Algorithm

In the communication age, in the daily life people constantly uses communication tools that are e-mail marketing, instant messaging, social networking, search engines, bookmarking systems, affiliate systems, print media and direct mail. These tools are used as an internet communication. However as a result of widespread of internet usage, security problems have become more important year by yea...

متن کامل

Pipelineable On-line Encryption

Correct authenticated decryption requires the receiver to buffer the decrypted message until the authenticity check has been performed. In high-speed networks, which must handle large message frames at low latency, this behavior becomes practically infeasible. This paper proposes CCA-secure on-line ciphers as a practical alternative to AE schemes since the former provide some defense against ma...

متن کامل

Authenticated On-Line Encryption

In this paper, we investigate the authenticated encryption paradigm, and its security against blockwise adaptive adversaries, mounting chosen ciphertext attacks on on-the-fly cryptographic devices. We remark that most of the existing solutions are insecure in this context, since they provide a decryption oracle for any ciphertext. We then propose a generic construction called Decrypt-Then-Mask,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Direct, Data and Digital Marketing Practice

سال: 2014

ISSN: 1746-0166,1746-0174

DOI: 10.1057/dddmp.2014.71