Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

E-mail encryption transmitting-receiving system

A technology for sending and receiving systems and e-mails, applied in electrical components, transmission systems, digital transmission systems, etc., can solve the problems of inappropriate AES algorithm, insecure AES algorithm, and no detailed description of encryption algorithm.

Inactive Publication Date: 2008-04-09
CHONGQING UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the disadvantages of these technologies are: they mainly focus on the peripheral technologies of email encryption, such as identity authentication and key management, but there is no detailed description of the core technology of email encryption, that is, the encryption algorithm of email itself
From this, it can be guessed that there may be some unsafe factors in the AES algorithm, so that the United States or some other countries can crack this algorithm
Since emails may involve some more confidential information, the AES algorithm is not suitable for encrypting emails
[0007] 2. The AES algorithm is relatively complicated: the 128-bit AES algorithm consists of 10 rounds of encryption, and each round of encryption consists of four encryption operations: Addkey, SubByte, ShiftRow and MixCoulmn, so the implementation is more complicated
Inefficient for encrypted email data, especially large email attachments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • E-mail encryption transmitting-receiving system
  • E-mail encryption transmitting-receiving system
  • E-mail encryption transmitting-receiving system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] As shown in Figure 1, the present invention is a kind of electronic mail encryption sending and receiving system, is made up of encrypting transmitter 1, deciphering receiver 2 and key bag 3, and described encrypting transmitter 1 is provided with encryption control mechanism 4, encryption mechanism 5 and a mail sending mechanism 6, wherein the encryption control mechanism 4 obtains the original mail, and reads the key in the key bag 3, and the output end of the encryption control mechanism 4 sends the key and the original mail to the encryption mechanism 5, The encryption mechanism 5 is equipped with a Liao's chaos generator, and the Liao's chaos generator generates the required chaos sequence data. The encryption control mechanism 4 uses the chaos sequence data to encrypt the mail information to obtain encrypted data, and then encodes the encrypted data and Integrated into an encrypted package, the encrypted control mechanism 4 sends the encrypted package to the mail s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An E-mail encryption / reception / transmission system is provided, which comprises an encryption transmitter, a decryption receiver and a key packet. The system is characterized in that the encryption transmitter and the decryption receiver are equipped with Liao's chaos generators which produce required chaotic sequence data. An encryption controller calculates and encrypts E-mail information by using the chaotic sequence data to produce encrypted data, and sends an encrypted E-mail. The decryption receiver calculates and decrypts the E-mail information by using the chaotic sequence data to produce a primary file. The invention has the advantages that the Liao's chaos generators are excellent in the data encryption; the system is simple, rapid and safe to operate, and the E-mail can be encrypted, decrypted and transmitted safely and quickly.

Description

technical field [0001] The invention belongs to an encryption / decryption system for electronic files, in particular to an email encryption sending and receiving system. Background technique [0002] SMTP and POP3 protocols are standards for sending and receiving e-mail on the Internet. Since these two standards do not require encryption of e-mail content, and e-mail content often involves privacy and important data, it is urgent for e-mail users to encrypt e-mail. Require. [0003] Since 2005, there have been many patented technologies on email encryption in my country. For example, "Achieving Method for Ensuring E-mail Security" (Patent Application No. 200510137623) proposes a method for generating mail encryption keys through multiple steps; "A Simple, Reliable E-mail (EMail) Security Solution Scheme" (Patent Application No. 200510130206) proposes a mail encryption key management scheme based on public key system; For the encryption method of the image in the mail; "E-m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/18H04L12/58
Inventor 廖晓峰周庆向涛肖迪邓绍江
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products