Internet Privacy Enhanced Mail

  title={Internet Privacy Enhanced Mail},
  author={Stephen T. Kent},
  journal={Commun. ACM},
  • S. Kent
  • Published 1 August 1993
  • Computer Science
  • Commun. ACM
Privacy Enhanced Mail (PEM) consists of extensions to existing message processing software plus a key management infrastructure. These combine to provide users with a facility in which message confidentiality, authenticity, and integrity can be effected. PEM is compatible with RFC 822 message processing conventions and is transparent to SMTP mail relays. PEM uses symmetric cryptography — for example, the Data Encryption Standard (DES) — to provide (optional) encryption of messages. Although the… 
Design and implementation of smartcard-based secure e-mail communication
A new secure e- email system is proposed and implemented to extend the popular Microsoft Outlook e-mail software with flexible security services and to combine these services tightly with smartcards.
An investigation of DUA caching strategies for public key certificates
This thesis research changed the reference PEM implementation to make use of the X.500 directory service instead of local databases for public key certificate management and implemented a centralized cache server and addressed the denial-of-service security problem that is present in the server.
Security management in Kerberos V5 for GSM network
  • M. Jaiganesh, B. Ramdoss
  • Computer Science
    2008 International Conference on Computing, Communication and Networking
  • 2008
This application aims at using Kerberos V5 to secure the communication between a J2Me MIDlet communicating over the GPRS, and a Banking Transaction Server.
Privacy Preserving Web-Based Email
This paper creates virtual channels over online services (e.g., Google's Gmail, Microsoft's Hotmail) through which messages and cryptographic keys are delivered and creates a wired “spread-spectrum” mechanism for protecting the privacy of web-based communication.
Applications of Digital Signature Certificates for Online Information Security
This chapter discusses online information security through cryptography, explaining digital signature certificates; their benefits, the underlying standards, involved techniques, procedures, algorithms, processes, structure, management, formats, and illustration of their working.
Issues 94—public key—trials and tribulations
This document was written based on the introductory talk presented at the special workshop, "Issue 94 - Public Key - Trials and Tribulations" in conjunction with the Tenth Annual Computer Security Applications Conference held in December 1994, to provide a catalyst to discussions at the conference.
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
This paper formulate the trade-off between the nested certification overhead and the time improvement on certificate path verification, and numerically analyzed for a 4-level 20-ary balanced tree-shaped PKI.
S/MIME with multiple e-mail address certificates: A usability study
This paper studies the usability of multiple e-mail address certificates in secure messaging, and reports the results of study carried out to evaluate user efficiency in sending/receiving S/MIME mail with and without the use ofmultiple e- mail address certificates.
A Multiple Signature Based Certificate Verification Scheme
  • Computer Science
  • 2002
This paper proposed a formal representation of certificate validation in Pretty Good Privacy (PGP) and X.509 systems that uses new logical assertions to support public-key based certification systems and different trust levels, and proposed a novel multiple digital signature scheme, namely nested signatures.
A distributed certificate management system (DCMS) supporting group-based access controls
This paper proposes an architecture for a distributed certificate management system (DCMS) that can also be used to provide support for group-based access controls and has been prototyped and is being used by the Swiss Federal Strategy Unit for Information Technology to protect access to intranet resources.


Security Requirements and Protocols for a Broadcast Scenario
  • S. Kent
  • Computer Science
    IEEE Trans. Commun.
  • 1981
Security requirements for a simple broadcast scenario characteristic of some of these applications are examined and protocols for achieving these requirements are developed and analyzed in terms of functionality and performance.
Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services
This document describes three types of service in support of Internet Privacy-Enhanced Mail (PEM) [1-3]: key certification, certificate- revocation list (CRL) storage, and CRL retrieval.
Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures
This document defines message encryption and authentication procedures, in order to provide privacy-enhanced mail (PEM) services for electronic mail transfer in the Internet. [STANDARDS-TRACK]
Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management
This is one of a series of documents defining privacy enhancement mechanisms for electronic mail transferred using Internet mail protocols. [STANDARDS-TRACK]
Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiers
This RFC provides definitions, references, and citations for algorithms, usage modes, and associated identifiers used in RFC-1113 and RFC-1114 in support of privacy-enhanced electronic mail.
Standard for the format of arpa intemet text messages
This document revises the specifications in RFC 733, in order to serve the needs of the larger and more complex ARPA Internet. Some of RFC 733's features failed to gain adequate acceptance. In order
Simple Mail Transfer Protocol
The objective of SMTP is to transfer mail reliably and efficiently and requires only a reliable ordered data stream channel.
Abstract syntax notation-one (ASN.1)
The author explains the concept and purpose of ASN.1, which is in effect a data definition language, allowing protocol data unit definition without needing to specify transmission encoding. The high