SecureEmailSystemDetails

Enter a topic name to show or a new topic name to create; then press Enter

Server Properties

This list may change until the release of v1.0

  1. Server Guid
  2. Server OS Type
  3. Server Public IP
  4. Server Creation UTC
  5. Server Web Home Page
  6. Client List Data
    1. Client Guid
    2. Client Creation UTC
    3. Client Email Address
    4. Client Public Key List
      1. Client Public Key Data
      2. Client Public Key Creation UTC
      3. Client Public Key State
      4. Client Update UTC
      5. Client Synchronization Status
  7. Server List Data
    1. Server Guid
    2. Server Creation UTC
    3. Server IP Address
    4. Server Public Key List
      1. Server Public Key Data
      2. Server Public Key Creation UTC
      3. Server Public Key State
      4. Server Update UTC
      5. Server Synchronization Status

Client Properties

This list may change until the release of v1.0

  1. Client OS Type
  2. Client Version
  3. Server Master Guid
  4. Server List
    1. Server Guid
    2. Server Public Key List
      1. Server Public Key Data
  5. Client List Data
    1. Client Guid
    2. Client Email Address
    3. Client Creation UTC
    4. Client Public Key List
      1. Client Public Key Data
      2. Client Public Key Creation UTC
      3. Client Public Key State
      4. Client Update UTC
      5. Client Synchronization Status

Server information properties in the client

Server API

This list may change until the release of v1.0

Client API

This list may change until the release of v1.0

Message Encryption

Both the client and the server must implement the Message Encryption to the following standard:

  1. Get Plain text message - P
  2. Hash Plain text message using SHA512 - H(P)
  3. Create signature by encrypting hash value H(P) using originator's private key - S
  4. Append Signature create in step above to plain text P + S
  5. Create One-time use symmetric key - Ks
  6. Get verified Recipient's public encryption key - Krpub
  7. Encrypt the Plain text and Signature using the symmetric key to create the ciphertext
  8. Encrypt the one-time use symmetric key using the recipient's public encryption key
  9. Create the message by appending the ciphertext and the encrypted on-time symmetric key to the originator's public key certificate

Message Decryption

Both the client and server must implement the Message Decryption to the following standard:

  1. Receive encrypted message.
  2. Extract originator's public key certificate and verify
  3. Extract the encrypted one-time use symmetric key
  4. Decrypt the one-time use symmetric key using the recipient's private key
  5. Decrypt the ciphertext using the decrypted one-time use symmetric key to create the plain text and signature
  6. Decrypt the signature using the supplied originator's public key to create the hash value
  7. Hash the plain text using SHA512 to create the hash value
  8. Compare both hash values to validate the message

Version: 12   Revised: 2015-01-13 19:06:44 Last Updated by: 2001:470:1d:80b:2d66:62a7:80af:b27e Rename Show Links to Topic