Secure E-mail Communications Through Cryptographic Techniques—A Study

  • Shafiya Afzal Sheikh
  • M. Tariq BandayEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1086)


E-mail is one of the leading and most reliable modes of communications even after the emergence of many new methods of electronic communication systems. E-mail messages are transmitted from the senders’ system to the recipients’ system over the Internet with the help of some intermediary nodes including servers, switches, and gateways. E-mail communication relies on some of the oldest communication protocols which have not been modified ever enough since. Hence, e-mail communication is vulnerable to some security risks including eavesdropping, spoofing, tampering, and phishing. The e-mail communication system makes use of some security protocols, techniques, and data encryption methods in many ways to make this communication secure and reliable. This paper reviews the security of e-mail protocols and data encryption techniques that are in use in the e-mail system. It reports the results of a study of the roles and advantages of e-mail security techniques, protocols, and algorithms. This paper also highlights security vulnerabilities in an e-mail communication system and the possibility for improvement in the control measures.


Secure E-mail Cryptography Spam Symmetric key Asymmetric key RSA 



This research work has been supported by Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Government of India, under its file no. EMR/2016/006987.


  1. 1.
    M.T. Banday, J.A. Qadri, N.A. Shah, A practical study of E-mail communication through SMTP. Working Papers on Information Systems, Sprouts. ISSN: 1535-6078, 10(20) (2010)Google Scholar
  2. 2.
    Klensin, Simple Mail Transfer Protocol, IETF RFC 2821 (2001)Google Scholar
  3. 3.
    J. Klensin, N. Freed, M. Rose, E. Stefferud, D. Crocker, SMTP service extensions (1995). 1017487RFC1869Google Scholar
  4. 4.
    P. Tzerefos, C. Smythe, I. Stergiou, S. Cvetkovic, A comparative study of simple mail transfer protocol (SMTP), post office protocol (POP) and X.400 electronic mail protocols, in Proceedings of the 22nd Annual IEEE Conference on Local Computer Networks (1997), pp. 545–554Google Scholar
  5. 5.
    M. Crispin, RFC 3501: Internet Message Access Protocol Version 4rev1. IETF (2003)Google Scholar
  6. 6.
    H. Zoran, G. Druga, Varaždin, Croatia, Comparative analysis of cryptographic algorithms. Int. J. Digit. Technol. Econ. 1, 127–134 (2016)Google Scholar
  7. 7.
    X. Zhao, T. Wang, Y. Zheng, Cache timing attacks on camellia block cipher. IACR Cryptology ePrint (2009)Google Scholar
  8. 8.
    D. Lei, L. Chao, K. Feng, New observation on Camellia, in Proceedings of SAC’05, Lecture Notes in Computer Science 3897 (Springer, Berlin, 2006), pp. 51–64Google Scholar
  9. 9.
    M. Rouvala, White paper: Security and WSN. New Nordic Engineering (2017)Google Scholar
  10. 10.
    B. Scheneir, Applied Cryptography: Protocols, Algorithms, and Source Code in C (Wiley, New York, 1996)Google Scholar
  11. 11.
    J. Kim, A. Biryukov, P. Bart, S. Hong, On the security of HMAC and NMAC based on AVAL, MD4, MD5, SHA-0 and SHA-1, in International Conference on Security and Cryptography for Networks, SCN 2006: Security and Cryptography for Networks (2006), pp 242–256 Google Scholar
  12. 12.
    A.A. Milad, H.Z. Muda, H.Z. Muhamad Noh, M.A. Algaet, Comparative study of performance in cryptography algorithms (Blowfish and Skipjack). J. Comput. Sci. 7, 1191–1197 (2012)Google Scholar
  13. 13.
    V. Prajwal, K. Prema, User defined encryption procedure for IDEA algorithm, in International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2018)Google Scholar
  14. 14.
    FIPS, FIPS Pub 197: Advanced Encryption Standard (AES). US Nat’l Institute of Standards and Technology (NIST) (2001)Google Scholar
  15. 15.
    X. Zhou, X. Tang, Research and implementation of RSA algorithm for encryption and decryption, in Proceedings of 2011 6th International Forum on Strategic Technology. IEEE (2011)Google Scholar
  16. 16.
    Y. Zhang, C. Tianxi, T. Hong, A new secure E-mail scheme based on elliptic curve cryptography combined public key, in IFIP International Conference on Network and Parallel Computing (2008)Google Scholar
  17. 17.
    W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  18. 18.
    M.T. Banday, J.A. Qadri, A study of E-mail security protocols. eBritian, British Institute of Technology and E-commerce, UK, Issue 5, summer 2010 (2010), pp. 55–60. ISSN: 1755-9200Google Scholar
  19. 19.
    E. Rescorla, HTTP Over TLS. IETF RFC 2818 (2000)Google Scholar
  20. 20.
    M.T. Banday, S.A. Sheikh, Multiple E-mail address certificate, in International Conference on Advances in Computing, Communications, and Informatics (ICACCI-2013) (IEEE, 2013), pp. 1134–1139Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  1. 1.PG Department of Electronics and Instrumentation TechnologyUniversity of KashmirSrinagarIndia

Personalised recommendations