© 2014, IJARCSMS All Rights Reserved 24 | P age ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Improving Security of Password and Classification of Threaten Emails S. Lavanya 1 Department of Information Technology E. G. S. Pillay Engineering College Nagapattinam, Tamil Nadu India P. Suganya 2 Department of Information Technology E. G. S. Pillay Engineering College Nagapattinam, Tamil Nadu India E. Elakiya 3 Department of Computer Science and Engineering E. G. S. Pillay Engineering College Nagapattinam, Tamil Nadu India E. Vijayavani 4 Department of Information Technology E. G. S. Pillay Engineering College Nagapattinam, Tamil Nadu India Abstract: The utilization of passwords in E-mail applications is especially fragile because of the possibility of off speculating assaults. In this paper we propose our model S-MAIL for strong computationally secure password using simple conventional encryption technique along with threaten E-mail classification using content inspection mechanism in E-mail application. S-MAIL focused us on a large number of key factors in determining the unnecessary and illegal emails by providing the automatic threaten email detection. In this model we define an idea of equivalence between messages and also additionally portray when passwords are used securely in a message or in a set of messages. More importantly, we demonstrate that typically secure employments of passwords are likewise computationally secure. Keywords: password security; conventional encryption; classification; threaten email; content inspection mechanism. I. INTRODUCTION Mail, or post, is a method for transmitting information and tangible objects, wherein written documents, typically enclosed in envelopes and also small packages are delivered to destinations around the world. Electronic mail, most commonly abbreviated email and e-mail, is a method of exchanging digital messages. E-mail systems are based on a store-and-forward model in which e-mail computer server systems accept, forward, deliver and store messages on behalf of users, who only need to connect to the e- mail infrastructure, typically an e-mail server, with a network-enabled device for the duration of message submission or retrieval. Even though email systems are well classified and they are possessed with well defined structure, in security aspect they are too weak. Passwords stored in back end don’t have more authentications. Hence it might have been hacked. Passwords and other weak secrets sometimes used as cryptographic keys in security conventions and somewhere else. The utilization of fragile secrets is especially sensitive due to the possibility of offline guessing. In such an attack, information that relies on upon a weak secret is utilized as a part of checking supposition of the values of the frail secret. Passive attacks such as password guessing do not need the interaction with users, so they are not much easy to detect. Brutus attack may be done out after an active attack, based on the exchange of messages in the course of active attack. The sustained supremacy of passwords over all other methods of authentication is a major discomfiture to security researchers. As technology moves ahead in other areas, passwords tenaciously endure and reproduce with every new web site. Widespread discussions of unconventional authentication schemes have come with no state-of-the-art answers.