Open Access Open Access  Restricted Access Subscription or Fee Access

Design and Implementation of a Novel Cryptographic Mail Composer

S. N. Sivanandam, P. Visalakshi, S. Balamurugan


In today’s dynamic and information rich environment, information systems have become vital for any organization to survive. With the increase in the dependence of the organization on the information system, there exists an opportunity for the competitive organizations and disruptive forces to gain access to other organizations information system. This hostile environment makes information systems security issues critical to an organization.This paper describes the implementation of a Cryptographic Mail Composer, in an Integrated Development Environment (IDE) that is used to send the mail in encoded format. By using this encoding method the mail will be sent very safe, the preventing the hackers from reading the mail. The mailer is used to send the encrypted mail directly to the mail box as it is. It can also send the effective html page, images and textual mails. Instead of this, the composer will send the mail with the enclosures and not as attachment.


Mail Composer, Cryptography, Encryption,Decryption, Integrated Development Environment

Full Text:



Menezes, P. van Oorschot, and S.Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997, p. 81-83.

Marco Cantu “Mastering in Delphi 6”, Sybex, United States of America,2001.

Scott Jarol, Dan Haygood, Chris D. Coppola “Delphi 2 Multimedia Adventure set”, Coriolis Group Books, 1996

Paul Kimmel, “Building Delphi 6 Applications”, Osborne/McGraw-Hill,2001

W.Keith Edwards, “The Design and Implementation of Montage Multimedia Mail System”, IEEE Computer, pp.47-57, 1990.

Huang, C.M. & Lo C.M. Multimedia E-mail: the evolution approach based on adapters. Software-Practice and Experience, 24(9), 785-800,Sep 1994.

Schoobert Foo, Hiu.S.C., “Delivery of the Video Mail on the World Wide Web”, Journal of Network and Computer Applications, 20, 389-403.

Guastello, S., M. Traut, and G. Korienek. [1989] Verbal Versus Pictorial Representations of Objects in a Human Computer Interface. In International Journal of Man-Machine Studies, July 1989, Vol. 31, No. 1,pp. 99-120.

Ray Lischner, “Delphi in a nutshell: A desktop’s quick reference”, O’Reilly, 2000

D Ellard, J Ledlie, P Malkani, M Seltzer, “Passive NFS tracing of email and research workloads”, Conference on File and Storage Technologies,2001

Ma, C. Osherenko, A. Prendinger, H. Ishizuka, M., “A chat system based on emotion estimation from text and embodied conversational messengers”, Proceedings of the 2005 International Conference on Active Media Technology, 2005, pp. 546-548.

J Minato, DB Bracewell, F Ren, S Kuroiw, “Statistical Analysis of a Japanese Emotion Corpus for Natural Language Processing”, Lecture Notes in Computer Science, Springer, 200, pp. 924-929

Abbasi, A.Z. Shaikh, Z.A. , “An Approach Towards Emotion Estimation During Chat Sessions Using Software Agents”, 4th International Conference on, Innovations in Information Technology, 2007, pp.511-515

MP Carretero, D Oyarzun, A Ortiz, I Arizkuren, “Preserving Avatar Genuineness in Different Display Media”, Volume 13, Number 6 / December, 2008, pp.627-634

KN Tsoi, SM Rahman, “"Media-on-demand" multimedia electronic mail:a tool for collaboration on the Web”, Aug 2009, pp.515-520 [17]


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.