LIGHTWEIGHT PRETTY GOOD PRIVACY EMAIL ENCRYPTION

Page 1

e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:12/December -2020

Impact Factor- 5.354

www.irjmets.com

LIGHTWEIGHT PRETTY GOOD PRIVACY EMAIL ENCRYPTION Waseem Ullah Khan*1, Tahir Ullah*2, Hizbullah Khan Jadoon*3, Noor Ul Arfeen*4 *1 2 3 Department

of Computer Systems Engineering (CSE), UET Peshawar, Pakistan. *4Agriculture

University Peshawar, Pakistan.

ABSTRACT The security is a major concern in an electronic mail, it causes a lot of issues when a user attempts to send, forward or receive digital information via the internet. Pretty Good Privacy (PGP) is an encryption software used for signing, encrypting & decrypting electronic mails in order to increase the security of email communications. In PGP, compression is done after encryption. Compression does not give security at all; it merely hides things while encryption secure data. The encrypted data is random and it cannot be compressed. So, properly encrypted data cannot be compressed. In this paper, we have proposed lightweight PGP encryption in which compression is done before encryption. After implementing the proposed encryption method, the results show better performance regarding time and size of encrypted data. Keywords: Internet of Things, Security, DTLS, Contiki, Cooja.

I.

INTRODUCTION

Pretty Good Privacy (PGP) is an encryption standard for securing electronic mails [1]. PGP offer following services i.e. Authentication, Confidentiality, Integrity and Non-Repudiation. PGP is a hybrid cryptosystem combines features of both symmetric and asymmetric cryptography [2]. PGP process includes combination of hash function, digital signatures, compression algorithm, symmetric and asymmetric cryptography. Various algorithms are used such as SHA or MD5, RSA or DSA, IDEA or CAST, and ZIP or ZLIB for providing authentication, message integrity, confidentiality and digital signatures as shown in Figure 1.

Fig.-1: PGP Cryptographic Function The various terms discussed in the Figure 1 are discussed below [3],     

H: Hash function is used on message to generate message digest EP: Asymmetric Encryption used for digital signature, encrypted with private key of A II: Concatenation (combines both original message and encrypted message) Z: Compression EC: Symmetric Key Encryption used for confidentiality, message is encrypted using DES or IDEA or CAST-128 with one-time session key

www.irjmets.com

@International Research Journal of Modernization in Engineering, Technology and Science

[1040]


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
LIGHTWEIGHT PRETTY GOOD PRIVACY EMAIL ENCRYPTION by IRJMETS - Issuu