Implementation of an identity based encryption sub-system for secure e-mail and other applications

This thesis describes the requirements for, and design of, a suite of a sub-systems which support the introduction of Identity Based Encryption (IBE) to Intrenet communications. Current methods for securing Internet transmission are overly complex to users and require expensive and complex supporting infrastructure for distributing credentials such as certificates or public keys. Identity Based Encryption holds a promise of simplifying the process without compromising the security. In this thesis I will outline the theory behind the cryptography required , give a background to e-M ail and messaging protocols,the current security methods, the infrastructure used, the issues with these methods, and the break through that recent innovations in Identity Based Encryption hopes to deliver.I will describe an implementation of a sub-system that secures e-Mail and other protocolsin desktop platforms with as little impact on the end user as possible.

[1]  Nigel P. Smart,et al.  Cryptography: An Introduction , 2004 .

[2]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[3]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[4]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  R. Montoro,et al.  The curious incident of the dog in the night-time , 2005 .

[7]  Peter C. Gutmann Cryptographic Security Architecture: Design and Verification , 2003 .

[8]  Antoine Joux,et al.  A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.

[9]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[10]  Masao Kasahara,et al.  ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..

[11]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[12]  Carlisle M. Adams,et al.  X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.

[13]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[14]  R Ogden,et al.  An open secret. , 1997, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[15]  Mark Bartel,et al.  Xml-Signature Syntax and Processing , 2000 .

[16]  Jon Postel,et al.  Simple Mail Transfer Protocol , 1981, RFC.

[17]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[18]  Vincent Rijmen,et al.  The Block Cipher Rijndael , 1998, CARDIS.

[19]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[20]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.