Open Access Open Access  Restricted Access Subscription or Fee Access

Email Phishing Processing with Symmetric Key Cryptography via Network Credential

A. Prabhu Chakkaravarthy

Abstract


Cryptography is the science of using mathematics to encryption and decrypt data. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. In this application mail sending process are linked with the asymmetric cryptography and network credential to send the mail secure. The mail is send from one mail id via another SMTP mail server and the messages are encrypted by new algorithm called RSHAAKC. This is done to fool the hackers.


Keywords


Phishing, Asymmetric Cryptography, RSHAAKC, Email hacking, Email Network Credential.

Full Text:

PDF

References


Shamal Firake, Pravin Soni, Dr. B.B.Meshram “ Phishing E-mail Analysis” International Journal of Computer Science & Emerging Technologies (E-ISSN: 2044-6004) Volume 2, Issue 1, February 2011

A. Forouzan.,: " Cryptography and Network Security ", First Edition. McGraw-Hill, (2007), USA.

R Hamamreh., M Farajallah., " Design of a Robust Cryptosystem Algorithm for Non-InvertibleMatrices Based on Hill Cipher ". International Journal of Computer Science and Network Security,(2009): Vol (9), pp: 12-21.

J Hoffstein., et al, " An Introduction to Mathematical Cryptography ", First Edition. Springer Science& Business Media, (2008):, Germany.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.