Issue |
E3S Web Conf.
Volume 363, 2022
XV International Scientific Conference on Precision Agriculture and Agricultural Machinery Industry “State and Prospects for the Development of Agribusiness - INTERAGROMASH 2022”
|
|
---|---|---|
Article Number | 03003 | |
Number of page(s) | 8 | |
Section | Precision Agriculture. Yield Monitoring and Estimation | |
DOI | https://doi.org/10.1051/e3sconf/202236303003 | |
Published online | 14 December 2022 |
Mail client with data transfer protected with end-to-end encryption
1 Limited Liability Company "Titanium", office 201, building 37-19, Kotlostroitelnaya St., Taganrog, 347910, Rostov region, Russia
2 Don State Technical University, 1, Gagarin Sq., 344002, Rostov-on-Don, Russia
* Corresponding author: boldyrikhin@mail.ru
This article is devoted to the study of the issues of secure messaging and file exchange by e-mail at the enterprises of the agro-industrial complex. The purpose of this work is to develop an algorithmic support and software of mail client that supports the functionality of end-to-end data encryption. The following research methods are used in the article: comparison method, observation method, structural analysis method. The comparison method is used to identify differences between key distribution protocols. Methods of observation and analysis make it possible to understand the behavior of various protocols within systems that differ in technical and software properties. The article consists of four parts: Introduction, Materials and Methods, Results, Conclusions. The first part describes the relevance of the topic, discusses the features of various cryptographic protocols. The second part describes the developed algorithms that ensure the operation of the mail client and end-to-end data encryption. The third part discusses the results of software implementation of the developed algorithms. In the fourth part conclusions are made and summed up. The main results of the work are algorithmic implementation of software for local architecture based on the use of symmetric cryptography; a software tool designed according to a local scheme, including modules that allow you to develop a system on a client-server architecture.
© The Authors, published by EDP Sciences, 2022
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.