Developing Accessible P2P Email Encryption Based on CLOW-GKA
Faculty Mentor Information
Srisarguru Sridhar
Presentation Date
7-2016
Abstract
Secure email encryption is increasingly fundamental to successful personal and corporate communication. This is especially true as perpetual technological innovation makes assuring the integrity and authenticity of data more challenging. However current information technology standards places little emphasis on email encryption. CLOW-GKA (Certificateless One Way Group Key Agreement Scheme) is a new P2P (Point to Point) encryption system that eliminates the need for third party verification. The cryptosystem draws from such other schemes as Phil Zimmerman’s PGP (Pretty Good Privacy), Shamir’s ID-PKC (Identity Based Public Key Cryptosystem), and Al-Riyami’s CL-PKC (Certificateless PKC). This project’s purpose is developing an accessible graphical user-interface (GUI) that implements CLOW-GKA. In particular, we focus on devising a GUI that is compatible with Gmail services, performs with comparable functionality, and offers better security.
Developing Accessible P2P Email Encryption Based on CLOW-GKA
Secure email encryption is increasingly fundamental to successful personal and corporate communication. This is especially true as perpetual technological innovation makes assuring the integrity and authenticity of data more challenging. However current information technology standards places little emphasis on email encryption. CLOW-GKA (Certificateless One Way Group Key Agreement Scheme) is a new P2P (Point to Point) encryption system that eliminates the need for third party verification. The cryptosystem draws from such other schemes as Phil Zimmerman’s PGP (Pretty Good Privacy), Shamir’s ID-PKC (Identity Based Public Key Cryptosystem), and Al-Riyami’s CL-PKC (Certificateless PKC). This project’s purpose is developing an accessible graphical user-interface (GUI) that implements CLOW-GKA. In particular, we focus on devising a GUI that is compatible with Gmail services, performs with comparable functionality, and offers better security.
Comments
Poster #Th66