Visible to the public Secure Mail using Visual Cryptography (SMVC)

TitleSecure Mail using Visual Cryptography (SMVC)
Publication TypeConference Paper
Year of Publication2014
AuthorsAjish, S., Rajasree, R.
Conference NameComputing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on
Date PublishedJuly
KeywordsCFB mode encryption, chaos, chaos based image encryption algorithm, chaos-based image encryption algorithm, data privacy, dynamic s-box algorithm, e-mail messaging, Electronic mail, Encryption, gray scale image, Heuristic algorithms, image processing, Internet standards, low frequency wavelet coefficient, message authentication, OpenPGP, personal security, pretty good privacy, public key based image authentication method, public key cryptography, receipent mail box, receiver side, Receivers, secure mail using visual cryptography, SMVC, transmission medium, visual cryptography, visualization, wavelet decomposition, wavelet transform, wavelet transforms
Abstract

The E-mail messaging is one of the most popular uses of the Internet and the multiple Internet users can exchange messages within short span of time. Although the security of the E-mail messages is an important issue, no such security is supported by the Internet standards. One well known scheme, called PGP (Pretty Good Privacy) is used for personal security of E-mail messages. There is an attack on CFB Mode Encryption as used by OpenPGP. To overcome the attacks and to improve the security a new model is proposed which is "Secure Mail using Visual Cryptography". In the secure mail using visual cryptography the message to be transmitted is converted into a gray scale image. Then (2, 2) visual cryptographic shares are generated from the gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform and authenticated using Public Key based Image Authentication method. One of the shares is send to a server and the second share is send to the receipent's mail box. The two shares are transmitted through two different transmission medium so man in the middle attack is not possible. If an adversary has only one out of the two shares, then he has absolutely no information about the message. At the receiver side the two shares are fetched, decrypted and stacked to generate the grey scale image. From the grey scale image the message is reconstructed.

URLhttps://ieeexplore.ieee.org/document/6963148
DOI10.1109/ICCCNT.2014.6963148
Citation Key6963148