{"title":"Effectiveness of Anti-Spoofing Protocols for Email Authentication","authors":"Prashant D. Chauhan, Apurva M. Shah","doi":"10.1109/icct56969.2023.10076098","DOIUrl":null,"url":null,"abstract":"The continuous and exponentially increasing use of email as the main means of communication within two parties is also increasing risk to the involved parties due to the easily possible attacks on the email system. The core of the whole email system depends on SMTP protocol which came to actual existence only after 1980s. At the time of development of SMTP, present day highly computational security attacks couldn't have been considered which results in the security loophole in the present email system. In this paper we study the working and effectiveness of various protocols available today to countermeasure the security issues in present day email system.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icct56969.2023.10076098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The continuous and exponentially increasing use of email as the main means of communication within two parties is also increasing risk to the involved parties due to the easily possible attacks on the email system. The core of the whole email system depends on SMTP protocol which came to actual existence only after 1980s. At the time of development of SMTP, present day highly computational security attacks couldn't have been considered which results in the security loophole in the present email system. In this paper we study the working and effectiveness of various protocols available today to countermeasure the security issues in present day email system.