A Security of Circular Email in Manufacturing

Article Preview

Abstract:

In present, manufacturing organizations in some countries will have to submitinformation to both internal and external to the organization, called circular mail to report newswithin the organization or external relations. Administrative officer is responsibility about to senda circular mail for each organization and will be responsible for receiving letters in paper form orpublication or media message. Then the administrative officer will be read and extracted the letterand send a message in the form of emails to receivers as indicated on the letter. In mailings sendsuch potential attacks from disgruntled individuals; such as a change of email messages duringtransmission or identity thieves use a fake email address to send officials to the other party. If anattack occurs, the organization will make a loss. In terms of stability credibility and security in theuse of corporate email. This paper presents a model and how to send an email or letter online ina format that is more stable and secure by the applied technology of public key cryptography andhash function to encrypt the message to provide stability and security in the mail's circulars online.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1296-1300

Citation:

Online since:

April 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] S. Goldwasser, S. Micali and R.L. Rivest, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput. 17 (2) (1998) 281-308.

DOI: 10.1137/0217017

Google Scholar

[2] R.C. Merkle, A fast software one-way hash function, J. Cryptology. 3 (1) (1990) 43-58.

DOI: 10.1007/bf00203968

Google Scholar

[3] D. Endoh, M. Ito, K.O. Cho, Y. Kon, T. Morimura, M. Hayashi and M. Kuwabara, Retroviral sequence located in border region of short unique region and short terminal repeat of Md5 strain of Marek's disease virus type 1, J Vet. Med. Sci. Japanese Soc. Vet. Sci. 60 (2) (1998).

DOI: 10.1292/jvms.60.227

Google Scholar

[4] L. Koved, A. Nadalin, N. Nagaratnam, M. Pistoia and T. Shrader, Security challenges for Enterprise Java in an e-business environment, IBM Syst. J. 40 (1) (2001) 130-152.

DOI: 10.1147/sj.401.0130

Google Scholar

[5] D.W. Chadwick and A. Otenko, The PERMIS X. 509 role based privilege management infrastructure, Future Generation Comput. Syst. 19 (2) (2003) 277-289.

DOI: 10.1016/s0167-739x(02)00153-x

Google Scholar

[6] M. Naor and K. Nissim, Certificate revocation and certificate update, Selected Areas in Communications, IEEE. 18 (4) (2000) 561-570.

DOI: 10.1109/49.839932

Google Scholar

[7] H. Gilbert and H. Handschuh, Security analysis of SHA-256 and sisters, In Selected areas in cryptography, Springer Berlin Heidelberg. (2004) 175-193.

DOI: 10.1007/978-3-540-24654-1_13

Google Scholar