The emails work according to the
complex architectures. The complex email system is one of the most important
systems ever used in the email sending and receiving process. The private and
public keys in the image are showing the transferring of the message containing
publically shared information and private information. The hybrid system uses
both key encapsulation and private key to make the encryption and decryption of
the data possible. Hybrid system transfer the data in more faster and
relatively secured way as compared to the other system.
Complex email system of
Email System
The complex email system consists
of the process that starts from the sending email and ends at the receiving
that e-mail. The complex email system has some component that makes facilitate
the process of sending and receiving.
The major terms used in the complex email system are encrypted, decrypt,
digest, digital signature, public and private key. All these terms are discussed
below in detail. Under each heading functions and role in email system are also
discussed.
Hybrid Cryptosystem of
Email System
The hybrid cryptosystem is the
system related to the emails functions. In this cryptography, the high
efficiency of the symmetric key (also known as data encapsulation) gets the
combination with the convenient public key. The security and privacy of the
messages shared from one person to the other person is the prime concern of the
private key or symmetric key. While the public key is commonly considered as
the less convenient towards sharing the common secret.
Key encapsulation of
Email System
The key encapsulation is the
scheme that stands for the cryptosystem of the public key. The image (pasted in
the appendix) is showing that the message from the private key of Alice enters
into Bob's public key and then again enters in the private key of the Bob's.
Data encapsulation of
Email System
The private key in the complex
email system is the symmetric key that is also known as the data encapsulation
scheme. In the image of the complex
hybrid system the private key is working parallel to the public key but with
quite different functions as private key secures the data and protect from
external sharing. When the message was encrypted the email system of the Alice
automatically generates the private or symmetric key.
Encrypt of Email
System
An encrypt contains all the
activities that come before the decrypt. in the image, the encrypt includes the
activities as obtaining the public key for the message of Alice, private key
generation, encryption considering public key and sending both symmetry and
data encryptions.
Digital signature of
Email System
The image is also showing the digital signature in the
message. Digital signatures are usually not shared as secrete therefore the
digital signature is based on the public key. The shows that digital signature shifting
from private key of the Bob to the public key of the Alice.
Digest of Email
System
The digest is showing that the message is digested in the
public key of both receiver and sender. The digest is projected at both sides
of the image the sender side and the receiver side. the messages like the digital signature only
digest in the public key as in the image the message of digital signature enters
into the private key and after filtration goes into the public key rather than
digesting into to private key.
Decrypt of Email
System
The decrypt in the complex hybrid
system contains the activities like the decrypting the data contained by the
schemes of key encapsulation and data encapsulation. The working of decrypt in
the email starts from receiving the email.
Benefits of Email
System
There are several benefits
associated with the complex hybrid system of email. The major benefits
associated with the complex hybrid system are listed below:
·
The hybrid complex system ensures the security
for the data or messaged shared between two parties by using the private key
along with the public key.
· Systems only based on the key encapsulation and
the public key are not the appropriate option for the sharing of secret
data.
·
In the hybrid system, the data or secrete shared
through the symmetric keys can be secured and grouped into stream ciphers and
blocks. for instance, in the example of Alice, the data was sent to the Bob
containing both type of information as the secret information (the original
message) and public ally shareable data or information as the digital
signature. The complex hybrid system supported the transfer of secret
information preventing other systems from decrypting through the use of the
private key.
· The hybrid system can transfer the message many
times faster than the systems that only rely on the key encapsulation.
Thus, the
hybrid system of emails enables the senders and receiver to share the
information in the secure way. However other than the benefits, there are some
disadvantages also as the hybrid system is not easy to understand. The hybrid
system is also very complex as it shifts data from private key to the public
key and generates both types of the key more than two times in transferring of
a single message.