E-mail protocols with perfect forward secrecy
by Duncan S. Wong; Xiaojian Tian
International Journal of Security and Networks (IJSN), Vol. 7, No. 1, 2012

Abstract: In IEEE Communication Letters, Kim et al. and Sun et al. proposed several e-mail protocols and claimed that they provide perfect forward secrecy. In this paper, we show that under the assumption that the e-mail server is also malicious, Kim et al.'s two e-mail protocols do not provide perfect forward secrecy. While one of Sun et al.'s e-mail protocol provides perfect forward secrecy, it does not provide message authentication. We thus propose an improvement to Sun et al.'s e-mail protocol so that it provides both perfect forward secrecy and message authentication.

Online publication date: Sat, 11-Aug-2012

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com