Privacy Enhanced Mail (PEM) and it's Working - GeeksforGeeks (2024)

Improve Article

Save Article

Like Article

  • Last Updated :08 Jul, 2022
  • Read
  • Discuss
  • Improve Article

    Save Article

    Like Article

    Privacy Enhanced Mail (PEM) is an email security standard to provide secure electronic mail communication over the internet. Security of email messages has become extremely important nowadays. In order to deal with the security issues of emails the internet architecture board has adopted it.

    The PEM mainly provides the following services –

    1. Confidentiality –
      Confidentiality refers to the act of preventing unauthorized access to the information hence protecting it. The confidentiality is obtained in PEM by encrypting the messages by using various standard algorithms such as Data Encryption Standard (DES). DES in cipher block chaining mode is being currently used by PEM.
    2. Integrity –
      Data integrity refers to the consistency of data through out its life cycle. This is obtained by using a unique concept called as message digest where message digest is a hash function which converts the message into an image called digest on taking the message as input. PEM uses RSA encryption, MD2 and MD5 hash functions to generate the digests. An octet value is generated from the hash functions which is then encrypted which is then run against the message digest by the receiver assured of the integrity of the message that is transmitted.

    Working of PEM :
    The PEM works basically in 4 main steps.

    1. Canonical Conversion –
      This step involves the conversion of the message into a standard format that is independent of the computer architecture and the operating system of the sender and the receiver. If the sender and receiver has different computer architecture or operating system. It may lead to generation of different message digest due to difference in their interpretation because of syntactical difference from one operating system to an other.
    2. Digital Signature
      In this step, the digital signature is generated by encrypting the message digest of an email message with the sender’s private key.

      Privacy Enhanced Mail (PEM) and it's Working - GeeksforGeeks (1)

    3. Encryption
      The encrypted message is generated by encrypting the original message and digital signature together along with the symmetric key as shown in the figure below.This step is very crucial in order to obtain the confidentiality.

      Privacy Enhanced Mail (PEM) and it's Working - GeeksforGeeks (2)

    4. Base-64 Encoding –
      This is the last step where the binary output is transformed into character output. The binary output which is 24 bits is divided into 4 equal sets and mapped with the 8 bit character output generating a decimal code. Now PEM uses a separate map table and each number from the code generated is mapped with its corresponding value from the mapping table and binary equivalent corresponding to the 8 bit ASCII of the character is written.

    My Personal Notesarrow_drop_up

    Like Article

    Save Article

    Privacy Enhanced Mail (PEM) and it's Working - GeeksforGeeks (2024)
    Top Articles
    LCM of 9 and 10 - How to Find LCM of 9, 10?
    AMFIE ACADEMY - Investing in Traditional Investment Funds
    Tripper Bus Promo Code
    Beverlyvega Cam
    Wilson Tattoo Shops
    Sam Haikins
    When His Eyes Opened 3001
    Pleads Irksomely Crossword Clue
    Masori Chaps Ge Tracker
    What Happened To Athena Palomino
    Massagefinder Female
    Skip The Games Maui
    Fnv Turbo
    C&A Mode günstig online kaufen
    Akai Hana San Diego Coupon
    Waitlistcheck Sign Up
    Technische Informatica | Studeren bij hogeschool Saxion | Hogeschool Saxion
    New Anime Plot Copypasta
    Toledo Schools Closed
    7 Things To Know Before You Buy Gas at Sam's Club
    Mr Biggs Soul Sonic Force Net Worth
    Urban Blight Crossword Clue
    Burley Id Recent Bookings
    Weapons Storehouse Nyt Crossword
    Drexel Student Doctor Network
    what plus what equals 16 but also minus to be 4
    Teksystems Time And Expense
    Electric Toothbrush Feature Crossword
    Lycoming County Docket Sheets
    Missing 2023 Showtimes Near Cinemark West Springfield 15 And Xd
    Big Lots Furniture Leasing
    Weather Underground San Anselmo
    Monster Hunter Rise Steam Unlocked
    Kind Farms Reserve Medical And Recreational Cannabis Photos
    Ron Martin Realty Cam
    Now is The Perfect Time for Bethesda to Remake Morrowind
    Karen Khachanov Flashscore
    What Happened to Brookelyn Farthing? Is She Dead or Alive?
    Iowa State Map Campus
    Skroch Funeral Chapel Obituaries
    Yonajilboobsr
    The Top 10 Things to Do in the Poconos
    70 Fantastic creatures from mythology
    Mangadex.oeg
    AELF — Office des lectures — 1 janvier 2022
    Craiglsist Cars
    Brake Masters 228
    8664602315
    BEX Holiday Homes (Las Palmas de Gran Canaria): Alle Infos zum Hotel
    Latest Posts
    Article information

    Author: Pres. Lawanda Wiegand

    Last Updated:

    Views: 6206

    Rating: 4 / 5 (51 voted)

    Reviews: 82% of readers found this page helpful

    Author information

    Name: Pres. Lawanda Wiegand

    Birthday: 1993-01-10

    Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

    Phone: +6806610432415

    Job: Dynamic Manufacturing Assistant

    Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

    Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.