Suspicious Email Detection System via Triple DES Algorithm: Cryptography Approach

نویسندگان

  • Nisha Rani
  • Neetu Sharma
چکیده

Abstract: The paper presents a suspicious email detection System which detect suspicious activities. In the paper we proposed the use of cryptography strategies for terrorists email detection. Security plays a very important and crucial role in the field of Internet and for email communication. So there is a need of suspicious email detection system which detects all suspicious activities. The need for Suspicious email detection System is increasing due to the rapid usage of Email communication in the Internet world. Triple Data encryption standard (DES) is a private key cryptography system that provides the security in communication system. By using an Enhanced DES algorithm the security has been improved which is very crucial in the communication and field of Internet. Keywords— Cipher text, Decryption, 3DES, Encryption, Plaintext.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

Security and Privacy Issues in Secure E-Mail Standards and Services

One of the most popular Internet services is e-mail services which provide sending and receiving electronic messages of communication networks. E-mail standards and services apply various cryptographic algorithms to achieve the security goals (Stallings, 2006; Stallings, 2007) of confidentiality, integrity, authentication and non-repudiation. Data confidentiality in e-mail services is commonly ...

متن کامل

Sparse Boolean equations and circuit lattices

A system of Boolean equations is called sparse if each equation depends on a small number of variables. Finding efficiently solutions to the system is an underlying hard problem in the cryptanalysis of modern ciphers. In this paper we study new properties of the Agreeing Algorithm, which was earlier designed to solve such equations. Then we show that mathematical description of the Algorithm is...

متن کامل

Chapter 7 The Advanced Encryption Standard ( AES )

All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES algorithm was broken in 1998 using a system that cost about $250,000. It was also far too slow in software as it was developed for mid-1970’s hardware and does not produce efficient software code. Triple DES on the other hand, has thr...

متن کامل

Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System

This paper contains a technique for secret communication using cryptography. It is a technique which is used to protect the important data. The secret message is encrypted by a block cipher based on two cryptographic algorithms, the Data Encryption Standard (DES) and the Triple Data Encryption Algorithm (TDEA) which may be used by Federal organizations to protect sensitive data. This algorithm ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015