CFP last date
20 January 2025
Reseach Article

Email Encryption using RC4 Algorithm

by Meltem Kurt Pehlivanoğlu, Nevcihan Duru
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 14
Year of Publication: 2015
Authors: Meltem Kurt Pehlivanoğlu, Nevcihan Duru
10.5120/ijca2015907185

Meltem Kurt Pehlivanoğlu, Nevcihan Duru . Email Encryption using RC4 Algorithm. International Journal of Computer Applications. 130, 14 ( November 2015), 25-29. DOI=10.5120/ijca2015907185

@article{ 10.5120/ijca2015907185,
author = { Meltem Kurt Pehlivanoğlu, Nevcihan Duru },
title = { Email Encryption using RC4 Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 14 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number14/23278-2015907185/ },
doi = { 10.5120/ijca2015907185 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:33.940028+05:30
%A Meltem Kurt Pehlivanoğlu
%A Nevcihan Duru
%T Email Encryption using RC4 Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 14
%P 25-29
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the communication age, in the daily life people constantly uses communication tools that are e-mail marketing, instant messaging, social networking, search engines, bookmarking systems, affiliate systems, print media and direct mail. These tools are used as an internet communication. However as a result of widespread of internet usage, security problems have become more important year by year. Two main problems are related with internet is an open system and unsafe area. The encryption and decryption systems are designed to cope with this security gap. In this paper RC4 based encryption algorithm is used to ensure secure Email communications.

References
  1. Koblitz, N.1994. A course in Number theory and Cryptography.
  2. Schneier, B. 1996. Applied Cryptography - Protocols, Algorithms and Source Code in C.
  3. Jain, Y. K. and Gosavi, P. B. 2008. Email Security using Encryption and Compression. Computational Intelligence for Modelling Control & Automation International Conference.
  4. Guo, Z. and Okuyama, T. Finley, M. R. 2005. A New Trust Model for PKI Interoperability. Autonomic and Autonomous Systems and International Conference on Networking and Services.
  5. Rivest, R., Shamir, A., and Adleman, L. 1978. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM.
  6. Lu, C. and Geva, S. 2005. Secure email-based peer to peer information retrieval. International Conference on Cyberworlds (CW’05).
  7. Chen, T. Ma, S. 2008. A Secure Email Encryption Proxy Based on Identity-based Cryptography. International Conference on MultiMedia and Information Technology.
  8. Li, C. J., Dinghu, Q., Haifeng, Y., Hao, Z., and Nie, M. 2011. Email Encryption System Based On Hybrid Aes And Ecc. IET International Communication Conference on Wireless Mobile and Computing (CCWMC).
  9. Madi, N. K. M., Salehian, S., Masoumiyan, F., and Abdullah, F. 2012. Implementation of Secure Email Server in Cloud Environment. International Conference on Computer and Communication Engineering (ICCCE).
  10. Choukse, D., Singh, U. K., Laddhani, L., and Shahapurkar, R. 2012. Designing Secure Email Infrastructure. Ninth International Conference on Wireless and Optical Communications Networks (WOCN).
  11. Yeh, J. H., Zeng, F., and Long, T. 2014. P2P email encryption by an identity-based one-way group key agreement protocol. Parallel and Distributed Systems (ICPADS).
  12. Dacosta, I., Put, A., and De Decker, B. 2014. EmailCloak: A Practical and Flexible Approach to Improve Email Privacy. Ninth International Conference on Availability, Reliability and Security (ARES).
  13. Ojamaa, A. and Lind, U. R. 2013. Securing Customer Email Communication in E-Commerce. Sixth International Conference on Developments in eSystems Engineering.
  14. Kitsos, P., Kostopoulos, G., Sklavos, N., and Koufopavlou, O. 2004. Hardware İmplementation of The RC4 Stream Cipher. IEEE 1363.
  15. Klein, A. 2008. Attacks on the RC4 stream cipher, Designs, Codes and Cryptography. Springer- Verlag.
  16. Mantin, A. and Shamir. 2001. A Practical Attack on Broadcast RC4, FSE. LectureNotes in Computer Science SpringerVerlag.
  17. Mantin, A. 2005. Practical Attack on the Fixed RC4 in the WEP Mod. 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT).
  18. Fiuhrer, S., Mantin, A. and Shamir. 2001. Weaknesses in the key scheduling algorithm of RC4. 8th Annual International Workshop (SAC).
  19. Jindal, P. and Singh, B. 2014. Performance Analysis of Modified RC4 Encryption Algorithm. IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE).
  20. Yao, Y., Chong, J., and Xingwei, W. 2010. Enhancing RC4 algorithm for WLAN WEP Protocol. 2010 Chinese Control and Decision Conference
Index Terms

Computer Science
Information Sciences

Keywords

Decryption Electronic Mail Security Encryption POP3 RC4 SMTP