Article Preview
Buy Now
FEATURE
REALSecure
Vernam Cipher and E-mail
Issue: 5.6 (September/October 2007)
Author: JC Cruz
Author Bio: JC is a freelance technical writer living in British Columbia. He writes for various publications, pokes around with Cocoa and REALbasic, and spends time with his nephew. He can be reached at anarakisware@gmail.com.
Article Description: No description available.
Article Length (in bytes): 33,061
Starting Page Number: 23
Article Number: 5610
Resource File(s):
5610.zip Updated: 2013-03-11 19:08:00
Related Web Link(s):
http://tools.ietf.org/html/rfc2821
http://tools.ietf.org/html/rfc1939
http://tools.ietf.org/html/rfc3501
http://www.rbdeveloper.com
http://tools.ietf.org/html/rfc3548
http://tools.ietf.org/html/rfc4346
http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol
http://en.wikipedia.org/wiki/Post_Office_Protocol
http://en.wikipedia.org/wiki/Internet_Message_Access_Protocol
Excerpt of article text...
In this article, we will look into the topic of e-mail encryption. First, we will learn the basics of an e-mail system. Then we will learn the security issues that plague such a system. Next, we will develop two custom classes that use the Vernam cipher to encrypt a message. Finally, we will use these classes to send and receive an encrypted message.
A Quick E-mail Primer
Since 1961, e-mail became one of the most common forms of communication. It evolved from a way of exchanging written text to one that delivers pictures, sound, and even software.
Most e-mail systems work as
client-server systems (Figure 1). The e-mail client sends a message to the mail server. If the recipient is on the same server as the sender, the server sends acopy of the message to the recipient. Otherwise, the serverroutes the message to the other servers on the network.Also, most e-mail systems support at least two basic protocols to handle message exchange. Clients send messages to the server using SMTP. They then retrieve messages from the server using POP3 or IMAP.
The Simple Mail Transfer Protocol
...End of Excerpt. Please purchase the magazine to read the full article.