E-mail encryption transmitting-receiving system

A technology for sending and receiving systems and e-mails, applied in electrical components, transmission systems, digital transmission systems, etc., and can solve the problems of no detailed description of encryption algorithms, insecure AES algorithms, and inappropriate AES algorithms.

Inactive Publication Date: 2009-10-28
CHONGQING UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the disadvantages of these technologies are: they mainly focus on the peripheral technologies of email encryption, such as identity authentication and key management, but there is no detailed description of the core technology of email encryption, that is, the encryption algorithm of email itself
From this, it can be guessed that there may be some unsafe factors in the AES algorithm, so that the United States or some other countries can crack this algorithm
Since emails may involve some more confidential information, the AES algorithm is not suitable for encrypting emails
[0007] 2. The AES algorithm is relatively complicated: the 128-bit AES algorithm consists of 10 rounds of encryption, and each round of encryption consists of four encryption operations: Addkey, SubByte, ShiftRow and MixCoulmn, so the implementation is more complicated
Inefficient for encrypted email data, especially large email attachments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • E-mail encryption transmitting-receiving system
  • E-mail encryption transmitting-receiving system
  • E-mail encryption transmitting-receiving system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Such as figure 1 As shown, the present invention is a kind of electronic mail encryption sending and receiving system, is made up of encryption transmitter 1, decryption receiver 2 and key bag 3, and described encryption transmitter 1 is provided with encryption control mechanism 4, encryption mechanism 5 and mail The sending mechanism 6, wherein the encryption control mechanism 4 obtains the original mail, and reads the key in the key bag 3, and the output terminal of the encryption control mechanism 4 sends the key and the original mail to the encryption mechanism 5, and the encryption mechanism Liao's chaotic generator is installed in 5, and the Liao's chaotic generator generates the required chaotic sequence data. The encryption control mechanism 4 uses the chaotic sequence data to encrypt the mail information to obtain encrypted data, and then encodes the encrypted data and integrates them into encrypted data. package, the encryption control mechanism 4 sends the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An email encryption transceiver system, comprising an encryption transmitter, a decryption receiver and a key bag, is characterized in that: the encryption transmitter and the decryption receiver are provided with a Liao's chaos generator, and the Liao's chaos generator generates the required The encryption control mechanism uses the chaotic sequence data to calculate and encrypt the mail information to obtain encrypted data, sends encrypted mail, and the decryption receiver uses the chaotic sequence data to perform calculation and decryption on the mail information to obtain the original file. The beneficial effect is that the Liao's chaotic system can be well applied to data encryption. The system has the characteristics of simplicity, speed and good security. Ensure that emails can be encrypted, decrypted and transmitted safely and quickly.

Description

technical field [0001] The invention belongs to an encryption / decryption system for electronic files, in particular to an email encryption sending and receiving system. Background technique [0002] SMTP and POP3 protocols are standards for sending and receiving e-mail on the Internet. Since these two standards do not require encryption of e-mail content, and e-mail content often involves privacy and important data, it is urgent for e-mail users to encrypt e-mail. Require. [0003] Since 2005, there have been many patented technologies on email encryption in my country. For example, "Achieving Method for Ensuring E-mail Security" (Patent Application No. 200510137623) proposes a method for generating mail encryption keys through multiple steps; "A Simple, Reliable E-mail (EMail) Security Solution Scheme" (Patent Application No. 200510130206) proposes a mail encryption key management scheme based on public key system; For the encryption method of the image in the mail; "E-m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04L12/58
Inventor 廖晓峰周庆向涛肖迪邓绍江
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products