MIME Object Security Services

  title={MIME Object Security Services},
  author={Steve Crocker and Ned Freed and James M. Galvin and Sandra L. Murphy},
This document defines MIME Object Security Services (MOSS), a protocol that uses the multipart/signed and multipart/encrypted framework [7] to apply digital signature and encryption services to MIME objects. The services are offered through the use of end-to-end cryptography between an originator and a recipient at the application layer. Asymmetric (public key) cryptography is used in support of the digital signature service and encryption key management. Symmetric (secret key) cryptography is… 
Flexible Internet Secure Transactions Based on Collaborative Domains
This paper presents the cryptographic schemes needed to achieve confidentiality and authentication based on the collaboration of security domains and relies on the fact that key management and thus security services are easier to achieve inside a well confined domain.
IDUP and SPKM: developing public-key-based APIs and mechanisms for communication security services
  • C. Adams
  • Computer Science
    Proceedings of Internet Society Symposium on Network and Distributed Systems Security
  • 1996
Progress in the development of application program interfaces (APIs) and mechanisms which provide a comprehensive set of security services to application developers are discussed, ensuring maximum flexibility and scalability to future environments.
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols
Any encrypted e-mail can be decrypted using a one-message, adaptive chosen-ciphertext attack which exploits the structure of the block cipher chaining models used.
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution
The challenges of identifying requirements for deployability, defining a component architecture that maximizes the use of COTS components to help in deployment, developing the proxy encryption protocol to satisfy requirements and to fit within the component architecture, implementing and testing the solution, and packaging the release are addressed.
Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy
A secure multicast key protocol with perfect forward secrecy is proposed to ensure confidentiality and authentication of this kind of e-mail system, which employs the Chinese Remainder Theorem, RSA public key cryptosystems, and one-way hash functions.
E-mail-based Secure Information Transmission Method
EBSIT is built on the public key infrastructure and can provide secure services for data transmission in an application system and ensure data secure in the period of data storage to some extent.
A secure e-mail protocol using ID-based FNS multicast mechanism
A novel and feasible e-mail delivery mechanism using the secure multicast protocol with an ID-based factorial number structure (FNS) is proposed in the multicast system and shows that the proposed scheme outperforms the CRT-based secure e- mail scheme.
Secure Code Distribution
Two approaches to authentification for code distribution are described: one extends the JVM to include a digital signature in applets; the other uses MIME encapsulation to take advantage of available security infrastructures.
Wireless E-mail Security: A State-of-the-Art Review for Message Privacy and Protection from Application Perspective
  • R. Coskun
  • Computer Science
    IEEE SoutheastCon, 2004. Proceedings.
  • 2004
The main focus is given on e-mail security standards, message format types, email certificate and trust management systems and issues associated with each of these concepts from privacy and message integrity protection perspectives.
An integration of PGP and MIME
  • Kazuhiko Yamamoto
  • Computer Science
    Proceedings of Internet Society Symposium on Network and Distributed Systems Security
  • 1996
This scheme embeds PGP objects into MIME and maintains backward compatibility with PGP, and explains the viewing and composing mechanisms that allow users to handle PGP/MIME messages intuitively without format restrictions.


Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures
This document defines message encryption and authentication procedures, in order to provide privacy-enhanced mail (PEM) services for electronic mail transfer in the Internet. It is intended to become
Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted
This document defines a framework within which security services may be applied to MIME body parts: the type and contents of the control information body parts are determined by the value of the protocol parameter of the enclosing multipart/signed or multiparts/encrypted content type, which is required to be present.
Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services
This document describes three types of service in support of Internet Privacy-Enhanced Mail (PEM) [1-3]: key certification, certificate- revocation list (CRL) storage, and CRL retrieval.
Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management
This is one of a series of documents defining privacy enhancement mechanisms for electronic mail transferred using Internet mail protocols. [STANDARDS-TRACK]
MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies
This document redefines the format ofmessage bodies to allow multi-part textual and non-textual message bodies to be represented and exchanged without loss of information.
Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers
This document provides definitions, formats, references, and citations for cryptographic algorithms, usage modes, and associated identifiers and parameters used in support of Privacy Enhanced Mail
Standard for the format of arpa intemet text messages
This document revises the specifications in RFC 733, in order to serve the needs of the larger and more complex ARPA Internet. Some of RFC 733's features failed to gain adequate acceptance. In order
Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiers
This RFC provides definitions, references, and citations for algorithms, usage modes, and associated identifiers used in RFC-1113 and RFC-1114 in support of privacy-enhanced electronic mail.
The Directory --Authentication Framework. X.509, 1988. Developed in collaboration, and technically aligned
  • The Directory --Authentication Framework. X.509, 1988. Developed in collaboration, and technically aligned
Developed in collaboration, and technically aligned
  • Developed in collaboration, and technically aligned
  • 1988