Beruflich Dokumente
Kultur Dokumente
Dai Kuobin
College of Mathematical and Computer Sciences
Huanggang normal University
Hubei 438000,China
E-mail:654729702@qq.com
Abstract: Analysis of PGP content of the protocol, the kept confidential to prevent unauthorized messages were
protocol there is a public key distribution protocol system read, it can digitally sign the message so the recipient can
loopholes, through analysis, the protocol could not resist confirm the sender of the message, and can be sure that
the middle attack. In this paper proposed a method that the message has not been tampered with. It provides a
security of cryptographic algorithms in the original basis secure means of communication, but does not require any
of the above, from the protocol itself to strengthen prior confidentiality channel used to pass key. It uses a
security. Improved PGP cryptosystem from the point of RSA and a hybrid of traditional encryption algorithms,
view is difficult to break. message digest for digital signature algorithms,
encryption before compression, there is a good ergonomic
Keywords: PGP protocol, middle attacks design. It's powerful, with very fast speed. And its source
code is free.
I INTRODUCTION In [2] from the composition of email encryption software
PGP algorithms start with the core algorithm, the various
E-mail security include: First, Secret, ensuring that algorithms discussed security issues, and for RSA, MD5
information is not exposed to unauthorized entities or algorithm is less than the proposed two new algorithms:
processes, that is the message content can not be RIPEMD-160 digest algorithm based on and signature
identified by third parties (even if the network based on elliptic curve algorithm (ECDSA). Through
administrator), because it may involve businesses trade theoretical analysis and testing, obtained based on elliptic
secrets. Confidentiality can be achieved through data curves than the RSA signature algorithm with higher
encryption; the second is the integrity of the people who security, based on RIPEMD-160 digest algorithm MD5 is
can only be allowed to modify data, and can determine for more effective against brute-force attack, differential
whether the data has been tampered with, mainly to avoid cryptanalysis and linear cryptanalysis analysis. In this
third party e-mail communication between two or paper is to analyze the PGP email security agreement
deliberate modification caused commercial disputes, it itself, the program analyzes the presence of a security
can be a digital signature and other measures to solve; vulnerability, and gives a solution.
third certification, which means that both the
communication and the recipient of the message is sent to
confirm the identity of the sender of the responsibility for
the contents of letters sent, the recipient can not deny
received the message, so identification can prevent denial
to avoid liability disputes, it can be through data
encryption and digital signatures, etc. to achieve.
46
obtain the correct public key, the second step, send e-
mail. The following figure 3:
47
of the above, from the agreement itself to strengthen
security. Improved PGP cryptosystem from the point of
view is difficult to break.
REFERENCE
48