Skip to main content

2015 | Buch

Encrypted Email

The History and Technology of Message Privacy

insite
SUCHEN

Über dieses Buch

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it.

Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction: What Is Secure Email?
Abstract
Encryption is a powerful tool that can protect email from prying eyes across the Internet. First developed nearly 30 years ago, email encryption is widely available yet rarely used. The reasons for its slow development and adoption detailed in this book. Other topics covered here are the underlying cryptographic techniques, tricks and tips for using common email applications and the impact of encryption on management and storage of email.
Hilarie Orman
Chapter 2. A Brief History of Secure Email
Abstract
Secrecy in written language has a long history. Although written language remains virtually unchanged for millenia, the technology of secrecy has undergone rapid changes in the modern era. Bringing that technology to bear on email systems was a process that took more than 20 years. The many people who participated in that effort were divided between two camps that persist today.
Hilarie Orman
Chapter 3. How Does Secure Email Work?
Abstract
There are several components to the cryptography for secure email. The most fundamental concept is that public/private key pairs that enable asymmetric cryptography. The asymmetric methods protect the keys for the faster, more efficient symmetric key methods. By balancing the amount of material protected by each kind of key, implementations of secure email can be both fast and secure.
Hilarie Orman
Chapter 4. Using Secure Email
Abstract
Most email applications can send and receive secure email, but few users are aware of the features. Once enabled, the security options can be easy to use. Tools for examining the details of secure email messages and keys can help with getting over the initial hurdles and in diagnosing anomalies.
Hilarie Orman
Chapter 5. Living with Encrypted Email
Abstract
As with any protected information, availability and ease of access are concerns. There are good reasons for keeping email encrypted, even when that means giving up some convenience. Some limitations may come as a surprise to the unwary.
Hilarie Orman
Chapter 6. Conclusion
Abstract
The need for secure communication remains the same since ancient times. The military, businesses, and individuals need privacy in order to function effectively. There can be no “checks and balances” if communication cannot be kept private. Most human institutions are built on the assumption that some things can remain guarded, at least for a limited period of time. In today’s era of pervasive and immediate communication, privacy remains as important as ever.
Hilarie Orman
Backmatter
Metadaten
Titel
Encrypted Email
verfasst von
Hilarie Orman
Copyright-Jahr
2015
Electronic ISBN
978-3-319-21344-6
Print ISBN
978-3-319-21343-9
DOI
https://doi.org/10.1007/978-3-319-21344-6