e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:12/December -2020
Impact Factor- 5.354
www.irjmets.com
LIGHTWEIGHT PRETTY GOOD PRIVACY EMAIL ENCRYPTION Waseem Ullah Khan*1, Tahir Ullah*2, Hizbullah Khan Jadoon*3, Noor Ul Arfeen*4 *1 2 3 Department
of Computer Systems Engineering (CSE), UET Peshawar, Pakistan. *4Agriculture
University Peshawar, Pakistan.
ABSTRACT The security is a major concern in an electronic mail, it causes a lot of issues when a user attempts to send, forward or receive digital information via the internet. Pretty Good Privacy (PGP) is an encryption software used for signing, encrypting & decrypting electronic mails in order to increase the security of email communications. In PGP, compression is done after encryption. Compression does not give security at all; it merely hides things while encryption secure data. The encrypted data is random and it cannot be compressed. So, properly encrypted data cannot be compressed. In this paper, we have proposed lightweight PGP encryption in which compression is done before encryption. After implementing the proposed encryption method, the results show better performance regarding time and size of encrypted data. Keywords: Internet of Things, Security, DTLS, Contiki, Cooja.
I.
INTRODUCTION
Pretty Good Privacy (PGP) is an encryption standard for securing electronic mails [1]. PGP offer following services i.e. Authentication, Confidentiality, Integrity and Non-Repudiation. PGP is a hybrid cryptosystem combines features of both symmetric and asymmetric cryptography [2]. PGP process includes combination of hash function, digital signatures, compression algorithm, symmetric and asymmetric cryptography. Various algorithms are used such as SHA or MD5, RSA or DSA, IDEA or CAST, and ZIP or ZLIB for providing authentication, message integrity, confidentiality and digital signatures as shown in Figure 1.
Fig.-1: PGP Cryptographic Function The various terms discussed in the Figure 1 are discussed below [3],
H: Hash function is used on message to generate message digest EP: Asymmetric Encryption used for digital signature, encrypted with private key of A II: Concatenation (combines both original message and encrypted message) Z: Compression EC: Symmetric Key Encryption used for confidentiality, message is encrypted using DES or IDEA or CAST-128 with one-time session key
www.irjmets.com
@International Research Journal of Modernization in Engineering, Technology and Science
[1040]