Explore BrainMass
Share

Mail Infrastructure using Trusted Identities

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

How can we secure mail infrastructure using trusted identities?
What can be the trust criterias?
How mail transfer works and how the notion of trust should be introduced?
Why do we need identity based trust?
What can be the related works?
What can be a new approach to secure mail infrastructure?

© BrainMass Inc. brainmass.com October 25, 2018, 12:25 am ad1c9bdddf
https://brainmass.com/computer-science/searching/mail-infrastructure-using-trusted-identities-227315

Solution Preview

How can we secure mail infrastructure using trusted identities?

In an identity-based encryption scheme, data is encrypted using an arbitrary string as the key. For decryption, a decryption key is mapped to the arbitrary encryption key by a key authority. An email message is encrypted using the recipient's email address as the public key. It is not necessary that the recipient has already installed any software or generated a pair of keys.

When the encrypted email arrives, the recipient can request - upon authentication - a private key that allows them to decrypt all emails encrypted using their email address as the public key.

Certificates and certificate authorities are not necessary for communication to be secure. Authentication between recipient and key authority is crucial, however.

Reference: http://email.about.com/od/secureemailbyencryption/g/ibe.htm

What can be the trust criterias?

For a new identity that is hired in the organization, ie, a new employee, trust is obtained as part of the HR process. If the identity is external, such as a vendor or customer, trust has to be ...

Solution Summary

How can we secure mail infrastructure using trusted identities?

$2.19
See Also This Related BrainMass Solution

Historical and Statistical Logging, File Security and Firewalls

I need the following explained in about 2 paragraphs each the difference between the each of these entities.
@ Historical and statistical logging
@ File security and firewalls
@ Secret and public keys
@ Symmetric and asymmetric keys
@ Digital certificate and digital postmark

View Full Posting Details