E-Mail, Web Service and Cryptography

E-Mail, Web Service and Cryptography

Wasim A. Al-Hamdani
ISBN13: 9781615207831|ISBN10: 161520783X|EISBN13: 9781615207848
DOI: 10.4018/978-1-61520-783-1.ch003
Cite Chapter Cite Chapter

MLA

Al-Hamdani, Wasim A. "E-Mail, Web Service and Cryptography." Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, IGI Global, 2011, pp. 52-78. https://doi.org/10.4018/978-1-61520-783-1.ch003

APA

Al-Hamdani, W. A. (2011). E-Mail, Web Service and Cryptography. In H. Nemati & L. Yang (Eds.), Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (pp. 52-78). IGI Global. https://doi.org/10.4018/978-1-61520-783-1.ch003

Chicago

Al-Hamdani, Wasim A. "E-Mail, Web Service and Cryptography." In Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, edited by Hamid R. Nemati and Li Yang, 52-78. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-783-1.ch003

Export Reference

Mendeley
Favorite

Abstract

Cryptography is the study and practice of protecting information and has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, when data encryption was selected as an official Federal Information Processing Standard (FIPS) for the United States, cryptography has gained large attention and a great amount of application and use. Furthermore, cryptography started to be part of protected public communication when e-mail became commonly used by the public. There are many electronic services. Some are based on web interaction and others are used as independent servers, called e-mail hosting services, which is an Internet hosting service that runs e-mail servers. Encrypting e-mail messages as they traverse the Internet is not the only reason to understand or use various cryptographic methods. Every time one checks his/her e-mail, the password is being sent over the wire. Many Internet service providers or corporate environments use no encryption on their mail servers and the passwords used to check mail are submitted to the network in clear text (with no encryption). When a password is put into clear text on a wire, it can easily be intercepted. Encrypting email will keep all but the most dedicated hackers from intercepting and reading a private communications. Using a personal email certificate one can digitally sign an email so that recipients can verify that it’s really from the sender as well as encrypt the messages so that only the intended recipients can view it. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network” and e-mail is “communicate electronically on the computer”. This chapter focus on introduce three topics: E-mail structure and organization, web service types, their organization and cryptography algorithms which integrated in the E-mail and web services to provide high level of security. The main issue in this article is to build the general foundation through Definitions, history, cryptography algorithms symmetric and asymmetric, hash algorithms, digital signature, suite B and general principle to introduce the use of cryptography in the E-mailand web service

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.