Abstract

Spammers have a tremendous financial incentive to compromise user Email accounts. Email spoofing is a way to exploit user trust. In the traditional DKIM signature approach no Certificate Authority is use wherein the keys and certificates are stored in the DNS Repositories itself. Survey tells that most of the DNS and Mail servers are exploited to DNS cache poisoning attack. If an attacker/ spammer will able to create a malware to obtain this stored information then using the principles of Wiener attack on RSA he can get the key exponents. Using them for a given user ID a spammer would be able to generate message with signed spoofs of other signer's userID. He can act as an eavesdropper in place of normal sender and send spam Mails to other recipients making the genuine sender look like a spammer. Therefore this paper addresses the issues by allowing sender to indicate that their emails are signed and encrypted using ID based mediated RSAA technique based on user identity. This system use Certificate Authority and a key Mediator. Using the concept of PKCS#1 the public key generated from the hash value of the private key for encryption. During decryption the private key is split between key mediator and a user for partial decryption and full decryption of message respectively If original message is recovered and verified the sender message is accepted else rejected or blocked as spam message. Using this system attacker can never read the original message sent nor modify during transit. 

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call