Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Email System

Category: Computer Sciences Paper Type: Report Writing Reference: CHICAGO Words: 900

                The emails work according to the complex architectures. The complex email system is one of the most important systems ever used in the email sending and receiving process. The private and public keys in the image are showing the transferring of the message containing publically shared information and private information. The hybrid system uses both key encapsulation and private key to make the encryption and decryption of the data possible. Hybrid system transfer the data in more faster and relatively secured way as compared to the other system.

Complex email system of Email System

            The complex email system consists of the process that starts from the sending email and ends at the receiving that e-mail. The complex email system has some component that makes facilitate the process of sending and receiving.  The major terms used in the complex email system are encrypted, decrypt, digest, digital signature, public and private key. All these terms are discussed below in detail. Under each heading functions and role in email system are also discussed.

Hybrid Cryptosystem of Email System

        The hybrid cryptosystem is the system related to the emails functions. In this cryptography, the high efficiency of the symmetric key (also known as data encapsulation) gets the combination with the convenient public key. The security and privacy of the messages shared from one person to the other person is the prime concern of the private key or symmetric key. While the public key is commonly considered as the less convenient towards sharing the common secret.

Key encapsulation of Email System

        The key encapsulation is the scheme that stands for the cryptosystem of the public key. The image (pasted in the appendix) is showing that the message from the private key of Alice enters into Bob's public key and then again enters in the private key of the Bob's.

Data encapsulation of Email System

            The private key in the complex email system is the symmetric key that is also known as the data encapsulation scheme.  In the image of the complex hybrid system the private key is working parallel to the public key but with quite different functions as private key secures the data and protect from external sharing. When the message was encrypted the email system of the Alice automatically generates the private or symmetric key.  

Encrypt of Email System

          An encrypt contains all the activities that come before the decrypt. in the image, the encrypt includes the activities as obtaining the public key for the message of Alice, private key generation, encryption considering public key and sending both symmetry and data encryptions.

Digital signature of Email System

        The image is also showing the digital signature in the message. Digital signatures are usually not shared as secrete therefore the digital signature is based on the public key. The shows that digital signature shifting from private key of the Bob to the public key of the Alice.   

Digest of Email System

        The digest is showing that the message is digested in the public key of both receiver and sender. The digest is projected at both sides of the image the sender side and the receiver side.  the messages like the digital signature only digest in the public key as in the image the message of digital signature enters into the private key and after filtration goes into the public key rather than digesting into to private key.  

Decrypt of Email System

        The decrypt in the complex hybrid system contains the activities like the decrypting the data contained by the schemes of key encapsulation and data encapsulation. The working of decrypt in the email starts from receiving the email.

Benefits of Email System

        There are several benefits associated with the complex hybrid system of email. The major benefits associated with the complex hybrid system are listed below:

·         The hybrid complex system ensures the security for the data or messaged shared between two parties by using the private key along with the public key.

·    Systems only based on the key encapsulation and the public key are not the appropriate option for the sharing of secret data.  

·                 In the hybrid system, the data or secrete shared through the symmetric keys can be secured and grouped into stream ciphers and blocks. for instance, in the example of Alice, the data was sent to the Bob containing both type of information as the secret information (the original message) and public ally shareable data or information as the digital signature. The complex hybrid system supported the transfer of secret information preventing other systems from decrypting through the use of the private key.

·      The hybrid system can transfer the message many times faster than the systems that only rely on the key encapsulation.

            Thus, the hybrid system of emails enables the senders and receiver to share the information in the secure way. However other than the benefits, there are some disadvantages also as the hybrid system is not easy to understand. The hybrid system is also very complex as it shifts data from private key to the public key and generates both types of the key more than two times in transferring of a single message.

           

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Class Engineers

ONLINE

Top Class Engineers

1218 Orders Completed

Quality Assignments

ONLINE

Quality Assignments

0 Orders Completed

Coursework Assignment Help

ONLINE

Coursework Assignment Help

63 Orders Completed