Certified electronic mail
This paper examines certified mail delivery in postal systems and derives the essential requirements that may be met by a service called certified electronic mail. Protocols are presented to demonstrate how various flavours of certified electronic mail services may be implemented.
Keywordscertified electronic mail communications security protocol design
Unable to display preview. Download preview PDF.
- 1.N. Borenstein and N. Freed. Multipurpose Internet mail extensions (MIME). RFC 1521, September 1993.Google Scholar
- 2.CCITT. Recommendation X.400: Message handling system and service overview. November 1988.Google Scholar
- 3.B. Cox, J. D. Tygar and M. Sirbu. NetBill security and transaction protocol. Proceedings of the First USENIX Workshop on Electronic Commerce, July 1995.Google Scholar
- 4.D. Crocker. Standard for the format of ARPA Internet text messages. RFC 822, August 1982.Google Scholar
- 5.S. Crocker, N. Freed, J. Galvin and S. Murphy. MIME object security services. RFC 1848, October 1995.Google Scholar
- 6.W. Diffie. The impact of a secret cryptographic standard on encryption, privacy, law enforcement and technology. Hearings before the Subcommittee on Telecommunications and Finance of the Committee on Energy and Commerce, House of Representatives, One Hundred Third Congress, First Session, Serial No. 103-53, pages 111–116, April 29 and June 9, 1993.Google Scholar
- 7.S. T. Kent. Internet privacy enhanced mail. Communications of the ACM, 36(8):48–60, August 1993.Google Scholar
- 8.C. J. Mitchell, M. Walker and D. Rush. CCITT/ISO standards for secure message handling. IEEE Journal on Selected Areas in Communications, 7(4):517–524, May 1989.Google Scholar
- 9.C. J. Mitchell, D. Rush and M. Walker. A secure message architecture implementing the X.400-1988 security features. The Computer Journal, 33(4):290–295, 1990.Google Scholar
- 10.J. B. Postel. Simple mail transfer protocol. RFC 821, August 1982.Google Scholar
- 11.J. B. Postel and J. K. Reynolds. File transfer protocol. RFC 959, October 1985.Google Scholar
- 12.J. Zhou and D. Gollmann. A fair non-repudiation protocol. Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 55–61, Oakland, CA, May 1996.Google Scholar