International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 133

Research Paper | Information Technology | Congo | Volume 7 Issue 2, February 2018


Proposal for a Way to Counter the Falsification of e-Mails Exchanged using the Outlook E-Mail Client

Assistant Bertin Lobo Minga


Abstract: The purpose of this article is to provide a way to ensure the integrity of e-mail exchanged using the Microsoft Outlook e-mail client. The information exchanged by e-mail, from one correspondent to another in a professional environment or not, is very sensitive to the point that it is necessary to ensure their integrity. Nowadays, one of the most used email clients in the professional world is Outlook which is a product of the Microsoft business. It is technically proven that any message already sent or received using the previously mentioned e-mail client, that is Outlook, can be falsified by both its sender and its recipient. The solution proposed in this article is the use of electronic signatures using digital documents called certificates, obtained through a certification authority. The experimentation of said solution is simulated by means of the virtual machines by considering an illustration made on the basis of the exchanges made between two fictitious users created for demonstration purposes.


Keywords: certificate, cryptography, public key, signature, mail, Outlook


Edition: Volume 7 Issue 2, February 2018,


Pages: 624 - 628


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Assistant Bertin Lobo Minga, "Proposal for a Way to Counter the Falsification of e-Mails Exchanged using the Outlook E-Mail Client", International Journal of Science and Research (IJSR), Volume 7 Issue 2, February 2018, pp. 624-628, https://www.ijsr.net/get_abstract.php?paper_id=ART20179310

Similar Articles with Keyword 'certificate'

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale | Milind Penurkar [2]

Share this Article

Downloads: 120

Research Paper, Information Technology, Sri Lanka, Volume 3 Issue 12, December 2014

Pages: 972 - 975

Design and Implementation of the Family Information System

P. Hemija Sarawana | U. Priyatharsan

Share this Article
Top