© 2014, IJARCSMS All Rights Reserved 24 | P age
ISSN: 2321-7782 (Online)
Volume 2, Issue 4, April 2014
International Journal of Advance Research in
Computer Science and Management Studies
Research Article / Paper / Case Study
Available online at: www.ijarcsms.com
Improving Security of Password and Classification of Threaten
Emails
S. Lavanya
1
Department of Information Technology
E. G. S. Pillay Engineering College
Nagapattinam, Tamil Nadu – India
P. Suganya
2
Department of Information Technology
E. G. S. Pillay Engineering College
Nagapattinam, Tamil Nadu – India
E. Elakiya
3
Department of Computer Science and Engineering
E. G. S. Pillay Engineering College
Nagapattinam, Tamil Nadu – India
E. Vijayavani
4
Department of Information Technology
E. G. S. Pillay Engineering College
Nagapattinam, Tamil Nadu – India
Abstract: The utilization of passwords in E-mail applications is especially fragile because of the possibility of off speculating
assaults. In this paper we propose our model S-MAIL for strong computationally secure password using simple conventional
encryption technique along with threaten E-mail classification using content inspection mechanism in E-mail application.
S-MAIL focused us on a large number of key factors in determining the unnecessary and illegal emails by providing the
automatic threaten email detection. In this model we define an idea of equivalence between messages and also additionally
portray when passwords are used securely in a message or in a set of messages. More importantly, we demonstrate that
typically secure employments of passwords are likewise computationally secure.
Keywords: password security; conventional encryption; classification; threaten email; content inspection mechanism.
I. INTRODUCTION
Mail, or post, is a method for transmitting information and tangible objects, wherein written documents, typically enclosed in
envelopes and also small packages are delivered to destinations around the world. Electronic mail, most commonly abbreviated
email and e-mail, is a method of exchanging digital messages. E-mail systems are based on a store-and-forward model in which
e-mail computer server systems accept, forward, deliver and store messages on behalf of users, who only need to connect to the e-
mail infrastructure, typically an e-mail server, with a network-enabled device for the duration of message submission or retrieval.
Even though email systems are well classified and they are possessed with well defined structure, in security aspect they are too
weak. Passwords stored in back end don’t have more authentications. Hence it might have been hacked.
Passwords and other weak secrets sometimes used as cryptographic keys in security conventions and somewhere else. The
utilization of fragile secrets is especially sensitive due to the possibility of offline guessing. In such an attack, information that
relies on upon a weak secret is utilized as a part of checking supposition of the values of the frail secret. Passive attacks such as
password guessing do not need the interaction with users, so they are not much easy to detect. Brutus attack may be done out after
an active attack, based on the exchange of messages in the course of active attack.
The sustained supremacy of passwords over all other methods of authentication is a major discomfiture to security
researchers. As technology moves ahead in other areas, passwords tenaciously endure and reproduce with every new web site.
Widespread discussions of unconventional authentication schemes have come with no state-of-the-art answers.