Özgün Bir Şifreleme Algoritması Kullanan Güvenli E

Transkript

Özgün Bir Şifreleme Algoritması Kullanan Güvenli E
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
g]JQ%LUùLIUHOHPH$OJRULWPDVÕ.XOODQDQ
*YHQOL(-3RVWD8\JXODPDVÕ
0XKDPPHW6HUNDQdLQDU,úÕOdLQDU+DVDQùDNLU%LOJH
g]HW—%X oDOÕúPD LOH KHU JHoHQ JQ \D\JÕQODúPDNWD RODQ
\NVHN NDSDVLWHOL YH FUHWVL] RODUDN GD÷ÕWÕODQ H-posta
KL]PHWOHULQLQ GDKD JYHQLOLU NÕOÕQPDVÕ DPDoODQPÕúWÕU (-posta
LúOHPOHUL LoLQ ELOLQHQ YH \D\JÕQ NXOODQÕODQ úLIUHOHPH
DOJRULWPDODUÕQÕQ GÕúÕQGD \HQL ELU úLIUHOHPH DOJRULWPDVÕ
WDVDUODQPÕúWÕU 7DVDUODQDQ úLIUHOHPH DOJRULWPDVÕ\OD JHOLúWLULOHQ
e-SRVWDX\JXODPDVÕJYHQOLNNRQXVXQGDJHWLUHFH÷LDYDQWDMODUÕQ
\DQÕQGD FUHWVL] e-SRVWD VHUYLV VD÷OD\ÕFÕODUÕQÕQ L]LQ YHUGL÷L
|OoGHVXQXFXODUDHULúPHNWHYH\DSÕODQNRQILJUDV\RQODUDJ|UH
LVWHQLOHQ KHVDEÕQ WP H-SRVWD YHULOHULQL NHQGL YHULWDEDQÕQD
\NOH\HELOPHNWHGLU $\UÕFD úLIUHOHPH DOJRULWPDVÕ 06 Outlook
SURJUDPÕQDHNOHQWLRODUDNJHOLúWLULOHQ EDúNDELUX\Julamaya da
entegre edilerek kurumsal e-SRVWDLOHWLPLQGHGHJYHQOLH-posta
J|QGHULOPHVL VD÷lanmÕúWÕU. Her iki uygulamada GD úLIUHOHPH
DOJRULWPDVÕEDúDUÕOÕELUúHNLOGHJHUoHNOHúWLULOPLúWLU
Anahtar Kelimeler— E-SRVWD *YHQOL÷L 323 YH 6073
3URWRNROOHUL6LPHWULNùLIUHOHPH
Secure Email Application Using an Original Encryption
Algorithm
Abstract—In this study, email services which are distributed
free with high storage capacity and which become widespread
every day is intended to made more reliable. A new encryption
algorithm is designed for email operations which is out of the
known and widely used email encryption algorithms. Besides
the advantages of security issues of the email application that is
developed with
proposed encryption algorithm, mail
application can access to the email servers to the extent
permitted by free email service providers and all of the data in
desired email account can be downloaded into application
database according to configurations. Furthermore, the
encryption algorithm has been integrated into the add-in
application developed for MS Outlook program and by this
way the secure message sending is provided for organizational
email transmissions. The encryption algorithm was
implemented successfully for both applications.
Keywords² Email Security, POP3 and SMTP Protocols,
Symmetric Encryption.
I. Gø5øù
6UHNOLDUWPD\DGHYDPHGHQELOJLYHEHUDEHULQGHJHWLUGL÷L
ELOJL GH÷LúLPL Lú VUHNOLOL÷LQGH YH NXUXPODUÕQ JHOLúPHVLQGH
E\N URO R\QDPDNWDGÕU %LOJL GH÷LúLPLQGH ELUoRN PHWRW
EXOXQPDVÕQD UD÷PHQ H-SRVWD WP NXUXPODU LoLQ LOHWLúLP
DUDoODUÕDUDVÕQGDLONVÕUDGDJHOPHNWHGLU>1].
*QP]GH H-SRVWDODU NXUXPVDO LOHWLúLPLQ \DQÕQGD
ELUH\VHO LOHWLúLP LoLQ GH YD]JHoLOHPH\HFHN GHUHFHGH |QHPOL
ELU KDEHUOHúPH DUDFÕGÕU øOHWLúLPLQ \NVHN RUDQODUGD HM.S.Çinar+DFHWWHSHhQLv%LOJ0KH-posta:([email protected]).
,dLQDU *D]LhQLY%LOJ0KH-posta: ([email protected]).
+ù%LOJH'Ro'U*D]LhQLY%LOg0KH-posta:([email protected]).
Proceedings/Bildiriler Kitabı
332
SRVWDODUDUDFÕOÕ÷Õ\OD\DSÕOPDVÕEXLOHWLúLP]HULQGHQ\DSÕODQ
VDOGÕUÕODUÕQ GD DUWPDVÕQD VHEHS ROPXúWXU .XUXPODUÕQ
úLUNHWOHULQ ELUH\VHO NXOODQÕFÕODUÕQ H-SRVWD JYHQOL÷L
NRQXVXQGD|QOHPDOPDODUÕLKWL\DoKDOLQHJHOPLúWLU>].
øQFHOHQHQ oDOÕúPDODUGD H-SRVWD VLVWHPOHUL JYHQOL÷L
NRQXVX JHQHO RODUDN LúOHWLP VLVWHPL VHYL\HVLQGe, e-posta
X\JXODPDVÕ VHYL\HVLQGH YH D÷ DOW\DSÕVÕ VHYL\HVLQGH HOH
DOÕQPDNOD ELUOLNWH H-SRVWD VXQXFXVX YH LVWHPFL DUDVÕQGDNL
LOHWLúLPLQ JYHQOL÷L JYHQOL RWXUXP \|QHWLPL EDVLW YH
kriptografik anahtarlar, onay meVDMODUÕ LOH H-posta takibi,
spam PHVDMODUÕQ HOHQPHVL ]DUDUOÕ H-posta takibi gibi
JYHQOLNOH LOJLOL oRN IDUNOÕ NRQXODUGD oDOÕúPDODU \DSÕOGÕ÷Õ
J|UOPúWU>3,4,5,6].
<DSÕODQ EX oDOÕúPDGD H-posta sistemlerinin uygulama
VHYL\HVLQGHNLJYHQOL÷LGLNNDWHDOÕQDUDN|]JQELUDOJRULWPD
LOHúLIUHOHPHLúOHPL JHUoHNOHúWLULOPHNWHGLU
%X oDOÕúPDGD |]HOOLNOH OLWHUDWUGH NDUúÕODúÕODQ [7, 8]
VDOGÕUJDQÕQ J|QGHULFL LOH DOÕFÕ DUDVÕQGD PHVDM WUDIL÷LQL
GLQOH\HELOL\RUROPDVÕYHPHVDMÕGH÷LúWLUHELOPHVLH-SRVWDODUÕQ
úLIUHVL]RODUDNVXQXFXYHELOJLVD\DUODUGDWXWXOX\RUROPDVÕYH
JHQHORODUDNNXOODQÕFÕKDWDODUÕLOHGRQDQÕP\D]ÕOÕPDoÕNOÕNODUÕ
JLELWHKGLWOHULQHQJHOOHQPHVLKHGHIOHQPLúWLU
%XOXW ELOLúLP LOH NXOODQÕFÕ YHULOHULQLQ E\N ELU NÕVPÕQÕQ
EXOXW ]HULQGH RODFD÷Õ |QJ|UOPHNOH ELUOLNWH \NVHN
NDSDVLWHOL FUHWVL] H-posta VD÷OD\ÕFÕODU GD NXOODQÕFÕODUÕ LoLQ
ELU EXOXW RUWDPÕ VD÷ODPDNWDGÕUODU %XOXW ELOLúLP VHUYLV
modellerinden VHUYLV RODUDN VXQXODQ \D]ÕOÕP (Software as a
Service) \DNODúÕPÕQGD NXOODQÕFÕODUÕQ VHUYLV VD÷OD\ÕFÕODUÕQ
EXOXW DOW\DSÕVÕQÕ NXOODQDUDN ZHE WDEDQOÕ H-posta
X\JXODPDODUÕQD IDUNOÕ FLKD]ODUGDQ IDUNOÕ DUD\]OHUOH
HULúHELOPHOHUL PPNQ NÕOÕQPDNWDGÕU %X \DNODúÕPGD
kXOODQÕFÕ\D |]J VÕQÕUOÕ NRQILJUDV\RQ D\DUODPDODUÕ
\DSÕODELOPHNWH ROXS NXOODQÕFÕQÕQ GHSRODPD RUWDPÕQÕ LúOHWLP
VLVWHPOHULQLYHD÷DOW\DSÕVÕQÕNRQWUROHWPHVLYH\D\|QHWPHVL
PPNQROPDPDNWDGÕU [9].
.XOODQÕFÕODU WP e-SRVWD YHULOHULQL EXOXW ]HULQe
WDúÕGÕNODUÕQGD ED]Õ |]HO JL]OLOLN GHUHFHOL YHULOHULQLn úLIUHOL
olarak bu e-SRVWD VHUYLV VD÷OD\ÕFÕODUÕQGD WXWXOPDVÕQÕ
LVWH\HELOHFHNOHUGLU hFUHWVL] RODUDN VD÷ODQDQ EX \NVHN
NDSDVLWHOL YH KL]PHW GHYDPOÕOÕ÷Õ RODQ H-posta hizmet
VD÷OD\ÕFÕODUÕEXELOJLOHULED÷OÕEXOXQGXNODUÕGHYOHWLQJYHQOLN
ELULPOHUL YH\D oQF úDKÕVODU LOH SD\ODúDELOHFHNOHULQL
EHOLUWPHNOH EHUDEHU LVWHGLNOHUL ]DPDQ NXOODQÕFÕODUÕQÕQ
KHVDSODUÕQÕ NDSDWDELOHFHNOHULQL NXOODQÕFÕ V|]OHúPHOHULQGH
LIDGH HWPHNWHGLUOHU %X DoÕODUGDQ EDNÕOGÕ÷ÕQGD VRQ
NXOODQÕFÕODU LoLQ EX FUHWVL] e-posta servis VD÷OD\ÕFÕODUÕQÕQ
VXQXFXODUÕQGD
e-SRVWD YHULOHULQLQ úLIUHOL WXWXOPDVÕ YH
\DOQÕ]FD DQDKWDUODUÕQÕ SD\ODúWÕNODUÕ NLúLOHUOH úLIUHOL H-posta
LOHWLPOHULQL
JHUoHNOHúWLUPHOHUL
NLúLVHO
ELOJLOHULQLQ
20-21 September /Eylül 2013 | Ankara / TURKEY
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
PDKUHPL\HWLQLQ NRUXQPDVÕ KXVXVXQGD |QHPOL ELU JYHQOLN
PHNDQL]PDVÕVD÷OD\DFDNWÕU
dDOÕúPDGD |QHULOHQ \DNODúÕP XoWDQ XFD her seviyede
JYHQOL÷L VD÷ODPD\D \|QHOLN RODUDN |QHULOPLú ELU o|]P
olmamakla beraber, e-SRVWD PHVDMODUÕ úLIUHOHPHVLQLQ \D\JÕQ
RODUDN NXOODQÕODQ úLIUHOHPH DOJRULWPDODUÕ GÕúÕQGD IDUNOÕ ELU
DOJRULWPDLOHVD÷ODQPDVÕQÕKHGHIOHPLúWLU /LWHUDWUGH\DSÕODQ
DUDúWÕUPDODUGD VLPHWULN úLIUHOHPHGH DES, 3DES, AES ve
Blowfish [10,11,12@ DOJRULWPDODUÕQÕQ \D\JÕQ RODUDN
NXOODQÕOGÕ÷Õ J|UOPúWU E-SRVWD JYHQOL÷LQH \|QHOLN
VLPHWULN úLIUHOHPH DOJRULWPDODUÕ NXOODQDUDN \DSÕODQ
oDOÕúPDODUGD ise genellikle bahsedilen VLPHWULN úLIUHOHPH
DOJRULWPDODUÕNXOODQÕOGÕ÷ÕJ|]OHPOHQPLúWLU %XoDOÕúPDGDLVH
IDUNOÕ úLIUHOHPH WHNQLNOHUL DOJRULWPDQÕQ IDUNOÕ DGÕPODUÕQGD
X\JXODQDUDN |]JQ ELU VLPHWULN úLIUHOHPH algoritmaVÕ
JHOLúWLULOPLúWLU
dDOÕúPDQÕQ LNLQFL E|OPQGH JHOLúWLULOHQ VLPHWULN
úLIUHOHPH DOJRULWPDVÕQGDQ EDKVHGLOPHNWH oQF E|OPGH
e-SRVWD J|QGHUPH YH DOPD LoLQ JHUHNOL SURWRNROOHULQ
DoÕNODPDVÕ\DSÕOPDNWDYHELUVRQUDNLE|OPGHGHJHOLúWLULOHQ
e-SRVWD X\JXODPDODUÕ DQODWÕOPDNWDGÕU %HúLQFL E|OPGH
JHOHFHNWH \DSÕOPDVÕ SODQODQDQ oDOÕúPDODU |]HWOHQPHNWHGLU
6RQ RODUDN oDOÕúPDGDQ HOGH HGLOHQ ND]DQÕPODU YH VRQXoODU
VXQXOPXúWXU
2)
3)
4)
5)
6)
7)
8)
G|QúWUOPHVL YH EX GH÷HULQ ELW VHYL\HVLQGH oHúLtli
IRQNVL\RQODUGDQJHoLULOPHVLQLNDSVDPDNWDGÕU
ùLIUHOHPHLúOHPLQHJHOHQNDUDNWHUOLNGL]LLONRODUDN\HU
GH÷LúWLUPHLúOHPLQHWDELWXWXOXUøONNDUDNWHUYHVRQ
NDUDNWHU\HUGH÷LúWLULU
<HU GH÷LúWLUPH LúOHPLQGHQ VRQUD NDUDNWHUOLN EORN bitlik sa\ÕVDOELUGH÷LúNHQHDNWDUÕOÕUøONNDUDNWHUELWLQ
LON ELWLQL WHPVLO HGHU %X VD\ÕVDO GH÷HU DQDKWDU
GL]HVLQLQKHUELUNDUDNWHULQGHQHOGHHGLOHQVD\ÕVDOGH÷HU
NDGDUG|QGUPHLúOHPLQHWXWXOXU
'|QGUPH LúOHPLQLQ NDo NH] \DSÕODFD÷Õ DQDKWDU
dizesindeki her ELU NDUDNWHULQ VD\ÕVDO GH÷HULQLQ LOH
E|OQPHVLQGHQNDODQGH÷HULOHEHOLUOHQLU
'|QGUPHLúOHPLQGHQVRQUDHOGHHGLOHQYHULLOHELWOLN
VD\ÕVDO GH÷HUH DWDQDQ DQDKWDU DUDVÕQGD ;25 LúOHPL
JHUoHNOHúWLULOLU
ùLIUHOHQPLúVD\ÕVDO GH÷HURQDOWÕOÕNVD\ÕWDEDQÕQGDVWULQJ
GL]HVLQHG|QúWUOU'|QúWUPHLúOHPLVRQUDVÕúLIUHOL
EORNHOGHHGLOPLúROXU
'L÷HU NDUDNWHUOLN EORNODU LoLQ D\QÕ LúOHPOHU WHNUDU
edilir.
6RQ NDODQ EORN NDUDNWHUGHQ GDKD D] LVH JHUHNWL÷L
NDGDU ³´ NDUDNWHUL \HUOHúWLULOHUHN NDUDNWHUH
WDPDPODQÕU
II. E-POSTA Id(5ø.ùø)5(/(0(A/*25ø70$6,
ùLIUHOHPHDOJRULWPDVÕQGDJL]OLDQDKWDUOÕúLIUHOHPH\|QWHPL
NXOODQÕOPÕúWÕU *L]OL DQDKWDUOÕ úLIUHOHPH \|QWHPLQGH KHP
úLIUHOHPH KHP GH úLIUH o|]PH LúOHPL LoLQ D\QÕ DQDKWDU
kullaQÕOPDNWDGÕU %X \|QWHP VLPHWULN úLIUHOHPH RODUDN GD
DGODQGÕUÕOPDNWDGÕU 6LPHWULN úLIUHOHPHGH DQDKWDUÕQ DOÕFÕ
WDUDIÕQD JYHQOL ELU úHNLOGH LOHWLOPHVL |QHPOLGLU $QDKWDU
ROPDGÕ÷ÕVUHFHúLIUHOHQPLúPHWLQHOHJHoLULOVHGHDVÕOPHWQLQ
HOGH HGLOPHVL PPNQ GH÷Lldir [13]. ùHNLO ¶GH VLPHWULN
úLIUHOHPH DOJRULWPDODUÕQÕQ oDOÕúPD \DSÕVÕ DQD KDWODUÕ\OD
J|VWHULOPHNWHGLU
ùHNLOùLIUHOHPHDOJRULWPDVÕDNÕúGL\DJUDPÕ
ùHNLO6LPHWULNúLIUHOHPHDOJRULWPDVÕoDOÕúPD\DSÕVÕ
A. ùLIUHOHPH$OJRULWPDVÕ
dDOÕúPDQÕQ EX E|OPQGH JHOLúWLULOHQ DOJRULWPDGD
X\JXODQDQ úLIUHOHPH DGÕPODUÕ HOH DOÕQPÕú ROXS úLIUHOHPH
DOJRULWPDVÕùHNLO¶GHDNÕúGL\DJUDPÕRODUDNVXQXOPXúWXU
1) ùLIUHOHPH DOJRULWPDVÕ KHU bir 8 karakterin blok olarak
DOÕQÕS NDUDNWHUOLN GL]LQLQ ELWOLN VD\ÕVDO GH÷HUH
20-21 September /Eylül 2013 | Ankara / TURKEY
B. ùLIUHd|]PH$OJRULWPDVÕ
dDOÕúPDQÕQ EX E|OPQGH LVH JHOLúWLULOHQ DOJRULWPDGD
X\JXODQDQúLIUHo|]PHDGÕPODUÕHOHDOÕQPÕúROXSúLIUHo|]PH
DOJRULWPDVÕùHNLO¶GHDNÕúGL\DJUDPÕRODUDNVXQXOPXúWXU.
1) ùLIUH o|]PH DOJRULWPDVÕ úLIUHOHPH DOJRULWPDVÕQGD
izlenen yolun tersidir. Her ELU RQDOWÕOÕN VLVWHPGHNL GH÷HU EORN RODUDN DOÕQÕS ELWOLN VD\ÕVDO GH÷HUH
G|QúWUOHUHN ELW VHYL\HVLQGH oHúLWOL IRQNVL\RQODUGDQ
JHoLULOLU
333
Proceedings/Bildiriler Kitabı
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
2) ùLIUH o|]PH LúOHPLQH JHOHQ karakter RQDOWÕOÕN
VLVWHPGHNL GH÷HU ELWOLN VD\ÕVDO GH÷HUH
G|QúWUOU
3) (OGH HGLOHQ VD\ÕVDO GH÷HU LOH ELWOLN VD\ÕVDO GH÷HUH
DWDQDQDQDKWDUDUDVÕQGD;25LúOHPLJHUoHNOHúWLULOLU%X
VD\ÕVDO GH÷HU DQDKWDU GL]HVLQLQ KHU ELU NDUDNWHULQGHQ
elde edilen VD\ÕVDO GH÷HUNDGDUG|QGUPH LúOHPLQH WDEL
tutulur.
4) '|QGUPH LúOHPLQLQ NDo NH] \DSÕODFD÷Õ DQDKWDU
dizesindeki her ELU NDUDNWHULQ VD\ÕVDO GH÷HULQLQ LOH
E|OQPHVLQGHQHOGHHGLOHQNDODQGH÷HULQVD\ÕVÕQGDQ
oÕNDUÕOPDVÕ\ODEHOLUOHQLU
5) '|QGUPH LúOHPL VRQXFX HOGH HGLOHQ VD\ÕVDO GH÷HU
VWULQJH G|QúWUOU 6WULQJ GL]HVL bitlik yer
GH÷LúWLUPHLúOHPLQH (ilk 4 karakter ve son 4 karakter yer
GH÷LúWLULUWDELWXWXODUDNúLIUHVL]EORNHOGHHGLOLU
6) *HUL\H NDODQ EORNODU LoLQ GH D\QÕ LúOHPOHU
JHUoHNOHúWLULOHUHN úLIUHVL]PHWLQHOGHHGLOLU
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
D\DUODUÕ \DSPDN YH JHOHQ H-SRVWDODUÕ DOPDN LoLQ JHUHNOL
LúOHPOHUL\DSPDNDPDFÕ\ODWHOQHWNXOODQÕOPÕúWÕU
7HOQHWOH ELU VXQXFX\D ED÷ODQPDN LoLQ |QFHOLNOH
VXQXFXQXQ DGUHVL YH oDOÕúWÕ÷Õ SRUWX JLUPHN JHUHNPHNWHGLU
*HQHOOLNOH SRUW LoLQ YDUVD\ÕODQ GH÷HU ¶GXU %X LúOHPLQ
sonunda sunucu helo mesajÕ J|QGHUPHNWH YH ED÷ODQWÕQÕQ
KD]ÕU ROGX÷XQX EHOLUWPHNWHGLU <DSÕODQ LúOHPOHU GR÷UX
ROGX÷XVUHFH2.LOHFHYDSDOÕQPDNWDGÕU
%D÷ODQWÕVD÷ODQGÕNWDQVRQUD³86(5´NRPXWX\ODNXOODQÕFÕ
NRGX YH ³3$66´ NRPXWX\OD úLIUH JLULOHUHN VXQXFX\D HULúLP
VD÷ODQPDNWDGÕU
Bu DúDPDGDQ VRQUD oDOÕúPD VÕUDVÕQGD NXOODQÕODQ |QHPOL
NRPXWODUYHJ|UHYOHULDúD÷ÕGDEHOLUWLOPLúWLU>]:
STAT: *HOHQ NXWXVXQGD NDo DGHW H-SRVWD ROGX÷XQX
J|VWHUPHNWHGLU67$7NRPXWXNXOODQÕODUDNJHOHQNXWXVXQGD
e-SRVWD ROXS ROPDGÕ÷Õ YH NDo \HQL H-posta geldi÷LQLQ
NRQWURO\DSÕOPÕúWÕUùHNLO
LIST: Gelen kutusundaki e-SRVWDODUÕQ VÕUDVÕQÕ YH KHU
ELULQLQER\XWODUÕQÕJ|VWHUPHNWHGLUùHNLO
ùHNLO/,67YH67$7NRPXWODUÕQÕQoDOÕúWÕUÕOPDVÕYH|UQHNVRQXoODU
QUIT:
323 ED÷ODQWÕVÕQÕ VRQODQGÕUPDN LoLQ
kullaQÕOPDNWDGÕU
TOP: E-SRVWDLoHUL÷LQLQLVWHQLOHQVDWÕUDNDGDUJ|UOPHVLQL
VD÷ODPDNWDGÕU ³723 ´ LIDGHVL QXPDUDOÕ H-SRVWDQÕQ
VDWÕUÕQDNDGDUJ|UQWOHQPHVLQL VD÷ODPDNWDGÕU
RETR: %X NRPXWOD ùHNLO ¶WH J|UOG÷ JLEL JHOHQ
kutusundan istenilen e-SRVWDQÕQ VÕUD QXPDUDVÕ \D]ÕODUDN
GHWD\OÕ RODUDN LoHULN ELOJLOHUL DOÕQDELOPHNWHGLU %XUDGDNL
LoHULN VWDQGDUW e-SRVWDODUÕQ LoHUL÷LQH EHQ]HPHPHNWHGLU
Buradaki bilgiler e-SRVWDQÕQRUMLQDOKDOLQLJ|VWHUPHNWHGLU
ùHNLOùLIUHo|]PHDOJRULWPDVÕDNÕúGL\DJUDPÕ
III. E-POSTA P5272.2//(5ø
323 3RVW 2IILFH 3URWRNRO SURWRNRO HOHNWURQLN SRVWD
DOPDNLoLQVRQNXOODQÕFÕODUWDUDIÕQGDQNXOODQÕOPDNWDGÕU323
SURWRNROVD\HVLQGHNXOODQÕODQH-posta sunucusunda bulunan
postalar yerel diske indirilebilmektedir [14].
Elektronik posta J|QGHUPH SURWRNRO 6LPSOH 0DLO
Transfer Protocol), bir e-SRVWD J|QGHUPHN LoLQ VXQXFX LOH
LVWHPFL DUDVÕQGDNL LOHWLúLP úHNOLQL EHOLUOH\HQ SURWRNROGU
Sadece
e-SRVWDJ|QGHUPHNLoLQNXOODQÕODQEXSURWRNROGH
LVWHPFL ELOJLVD\DU 6073 VXQXFXVXQD ED÷ODQDUDN JHUHNOL
NLPOLN ELOJLOHULQL J|QGHUPHNWH VXQXFXQXQ RQD\ YHUPHVL
halinde gerekli e-postayÕ VXQXFX\D LOHWPHNWH YH ED÷ODQWÕ\Õ
VRQODQGÕUPDNWDGÕU>15].
A. 7HOQHWLOH323YH60736XQXFXODUÕQD%D÷ODQPD
Herhangi bir e-SRVWD VXQXFX\D ED÷ODQÕUNHQ QRUPDO ELU
TCP/IP ED÷ODQWÕVÕ \DSÕOPDNWDGÕU 323 LOH LOJLOL JHUHNOL
Proceedings/Bildiriler Kitabı
334
ùHNLO5(75NRPXWXQXQoDOÕúWÕUÕOPDVÕYH|UQHNVRQXoODU
E-SRVWD LoHUL÷LQLQ EDúODPD YH ELWLúLQL EHOLUWHQ VÕQÕU
%RXQGDU\GH÷HULH÷HULoHULNWHYDUVDVWULQJRODUDNDOÕQÕUYH
20-21 September /Eylül 2013 | Ankara / TURKEY
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
EXQGDQ VRQUDNL YH VÕQÕU GH÷HUOHUL DUDVÕQGD NDODQ DODQ
PHVDMÕQPHWQLQLQYHULOGL÷LDODQGÕUùHNLO¶GD0\QHWH-posta
sunucusuna gönderilen Gmail e-SRVWDLoHUL÷LLoLQ|UQHNVÕQÕU
GH÷HUOHULJ|UOPHNWHGLU
NXOODQÕODUDNJHUoHNOHúWLULOPLúWLU
9HULWDEDQÕQGD EXOXQDQ *HOHQ*LGHQ H-posta bilgilerinin
WXWXOGX÷X WDEORODU úLIUHOHPH LúOHPL LoLQ NXOODQÕODQ
DQDKWDUODUÕQ WXWXOGX÷X $QDKWDU%LOJLVL WDEORVX YH H-posta
göndermeDOPD LúOHPOHULQGH NXOODQÕODQ VXQXFX D\DUODUÕQÕQ
WXWXOGX÷X $\DUODU WDEORVX HQ EDVLW úHNLOGH ùHNLO ¶GH
J|UOPHNWHGLU
ùHNLO*PDLOH-SRVWDLoHUL÷LLoLQ|UQHNVÕQÕUGH÷HUOHUL
8\JXODPDGD 6073 VXQXFXVX RODUDN *PDLO¶LQ e-posta
VXQXFXVXNXOODQÕOPÕúWÕU
B. Ücretsiz E-3RVWD6HUYLV6D÷OD\ÕFÕøVWHPFL$\DUODUÕ
E-SRVWD LúOHPOHUL LoLQ NXOODQÕOPDNWD RODQ *PDLO <DKRR
0\QHW +RWPDLO JLEL FUHWVL] e-SRVWD VHUYLV VD÷OD\ÕFÕODUÕQÕQ
ELU NÕVPÕ 6073 VXQXFXODUÕQD HULúLPL HQJHOOHUNHQ ELU NÕVPÕ
GD323VXQXFXVXQDHULúLPLHQJHOOHPLúGXUXPGDGÕU8\JXQ
VXQXFXODUÕQ EXOXQPDVÕ LoLQ 7(/1(7 LOH ED÷ODQWÕ \DSÕODUDN
JHUHNOLWHVWOHULQ\DSÕOPDVÕ|QHPOLGLU
7DEOR¶GH*PDLO0\QHW Yahoo ve Hotmail gibi e-posta
KL]PHW VD÷OD\ÕFÕODUÕQÕQ 323 YH 6073 SURWRNROOHUL LoLQ
\DSÕODQGÕUPD D\DUODUÕ \HU DOPDNWDGÕU <DKRR H-posta
servisinde POP3 sXQXFXODUÕQD HULúLPL FUHWOL H-posta
KHVDSODUÕQDVD÷ODPDNWDLNHQGL÷HUH-SRVWDVHUYLVVD÷OD\ÕFÕODU
FUHWVL]RODUDNKHULNLSURWRNROGHKL]PHWHVXQPDNWDGÕUODU
$QFDN VHUYLV VD÷OD\ÕFÕODUÕQ 323 VXQXFXODUÕQdan e-posta
verilerini alabilmek LoLQ ZHE VD\IDODUÕ zerindeki e-posta
\DSÕODQGÕUPDD\DUODUÕQGDQH-SRVWDKHVDSODUÕQDHULúLPL]QLQLQ
verilmesi gerekmektedir.
ùHNLO(-SRVWDNRQWUROX\JXODPDVÕYHULWDEDQÕúHPDVÕ
323 VXQXFXVXQGDQ oHNLOHQ H-postalarla ilgili bilgiler
JHUHNOLG]HQOHPHOHUGHQJHoLULOLSSDUoDODQGÕNWDQVRQUDJHOHQ
SRVWDWDEORVXQDND\GHGLOPLúWLU
Giden e-SRVWD WDEORVXQGD X\JXODPDGDQ J|QGHULOHQ
SRVWDODUÕQ ELOJLOHUL DQDKWDU ELOJLVL WDEORVXQGD úLIUHOHPH
DOJRULWPDVÕQGD NXOODQÕODFDN DQDKWDU YH DQDKWDUÕQ
ND\GHGLOGL÷LWDULKELOJLVLD\DUODUWDEORVXQGDSRVWDJ|QGHUPH
YH DOPD LúOHPOHUL LoLQ NXOODQÕODQ VXQXFXODUÕQ ELOJLOHUL YH
VXQXFXODUGD \HWNLOL RODFDN NXOODQÕFÕQÕQ KHVDS ELOJLOHUL YH
tarih bilgisi \HUDOPDNWDGÕU
Temel E-3RVWDøúOHPOHULQLQ*HUoHNOHúWLULOPHVL
Yeni e-SRVWD J|QGHUPHN LoLQ ùHNLO ¶GHNL DQD PHQGH
³<HQL H-SRVWD´ VHoHQH÷L VHoLOHUHN H-SRVWDQÕQ LVWH÷H J|UH
úLIUHOHQPHGHQ
YH\D
úLIUHOHQHUHN
J|QGHULOHELOPHVL
VD÷ODQPDNWDGÕU ùLIUHOHQPLú RODQ H-SRVWDODUÕQ VRQXQD
X\JXODPD\D |]J ELU LIDGH RODQ ³-----LFU\SW´ LIDGHVL
eklenmektedir.
Uygulama gelen e-SRVWDQÕQ úLIUHOL YH\D úLIUHOHQPHGHQ
TABLO I
JHOPLúROPDGXUXPODUÕQÕúLIUHOHQPLúRODQPHVDMODUÕQVRQXQGD
Ü&5(76ø=E-POSTA S(59ø6øS$ö/$<,&,/$5,PROTOKOL YAPILANDIRMA
“-----LFU\SW´ LIDGHVLQLQ EXOXQXS EXOXQPDGÕ÷ÕQÕ NRQWURO
Bø/*ø/(5ø
POP3
SMTPHGHUHN \DSPDNWDGÕU %|\OHFH H-SRVWDQÕQ X\JXODPD
Gelen E-Posta
Giden E-Posta
Portu
Portu LoHULVLQGHNL DOJRULWPD\OD úLIUHOHQLS úLIUHOHQPHGL÷L WHVW
Sunucusu(POP3)
Sunucusu(SMTP)
HGLOPHNWHGLU (÷HU H-SRVWD úLIUHOHQHUHN J|QGHULOPLúVH HGmail
pop.gmail.com
995
smtp.gmail.com
587
SRVWD DODQÕQÕQ DOWÕQGDNL ³úLIUH o|]´ EXWRQXQD WÕNODQGÕ÷ÕQGD
Mynet
pop.mynet.com
110
pop.mynet.com
587 DúD÷ÕGDNL E|OPH\H úLIUHOHQPLú PHVDMÕQ úLIUHVL o|]OPú,
RUMLQDOKDOL\NOHQPHNWHGLU
Yahoo
<DOQÕ]FDhFUHWOL
+HVDSODUD$oÕN
Hotmail
pop3.live.com
995
smtp.mail.yahoo.com
587
smtp.live.com
587
IV. G(/øù7ø5ø/(1E-POSTA UYGULAMALARI
A. E-postD.RQWURO8\JXODPDVÕ
E-SRVWD NRQWURO X\JXODPDVÕ 1(7 SODWIRUPX
]HULQGH C# SURJUDPODPD GLOL LOH JHOLúWLULOPLú ROXS H-posta
YHULOHULQLQ WXWXODFD÷Õ YHULWDEDQÕ LoLQ 06 $FFHVV NXOODQÕOPÕúWÕU
Uygulamada temel e-SRVWD J|QGHUPH YH DOPD LúOHPOHUL
öncekL E|OPGH EDKVHGLOPLú RODQ 7HOQHW NRPXWODUÕ
20-21 September /Eylül 2013 | Ankara / TURKEY
ùHNLO(-3RVWDNRQWUROX\JXODPDVÕJHOHQ e-posta kutusu
335
Proceedings/Bildiriler Kitabı
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
.RQILJUDV\RQøúOHPOHUL
8\JXODPD LoHULVLQGHNL D\DUODU SHQFHUHVLQGHQ H-posta
VXQXFXVX D\DUODUÕ \DSÕOPDNWDGÕU %X D\DUODU, POP3
VXQXFXVXQD ED÷ODQPDN LoLQ JHUHNOL RODQ JHOHQ SRVWD
VXQXFXVX SRUW QXPDUDVÕ YH 6073 VXQXFXVXQD ED÷ODQPDN
LoLQJHUHNOLRODQJLGHQSRVWDVXQXFXVXSRUWQXPDUDVÕYHKHU
LNLVXQXFXLoLQGHNXOODQÕFÕKHVDEÕELOJLOHULQLNDSVDPDNWDGÕU
ùHNLO¶GD |UQHNNRQILJUDV\RQELOJLOHULVXQXOPDNWDGÕU
ùHNLO062XWORRNHNOHQWLVLúLIUHOLH-SRVWDJ|QGHUPHHNUDQÕ
ùHNLO¶GHLVHJHOHQúLIUHOLH-SRVWDQÕQJHOLúWLULOHQRXWORRN
HNOHQWLVLLOHo|]OPHVLLúOHPLJ|VWHULOPHNWHGLU
ùHNLO (-3RVWD NRQWURO X\JXODPDVÕ H-posta sunucu, hesap ve anahtar
D\DUODUÕ
AnDKWDU$\DUODUÕ
$QDKWDU GD÷ÕWÕP VRUXQX LOHWLúLPGH EXOXQDQ LNL WDUDIÕQ
RUWDNELUúLIUHOHPHDQDKWDUՁ]HULQGHDQODúPDODUÕVRUXQXGXU
ùLIUHOHPHDQDKWDUÕLOHúLIUH\Lo|]PHDQDKWDUÕQÕQD\QÕROGX÷X
NODVLN úLIUHOHPH DOJRULWPDODUÕ NXOODQDQ VLVWHPOHUGH DQDKWDU
GD÷ÕWÕP VRUXQX \D |QFHGHQ HOGHQ HOH DQDKWDUÕ YHUHUHN \D
|]HO YH JYHQOL ELU NDQDO YDVÕWDVÕ\OD \D GD JYHQOL DQDKWDU
GD÷ÕWÕPVXQXFXODUÕNXOODQDUDNo|]OPHNWHGLU [8].
<DSÕODQoDOÕúPDGDDQDKWDUSD\ODúÕPÕQÕQ|]HOYHJYHQLOLU
ELUNDQDOYDVÕWDVÕ\ODYH\DJYHQOLDQDKWDUGD÷ÕWÕPVXQXFXODUÕ
NXOODQÕODUDN JHUoHNOHúWLULOGL÷L YDUVD\ÕOPÕúWÕU ùLIUHOHPH
DOJRULWPDVÕQGD NXOODQÕOPÕú RODQ YH KHP J|QGHULFL KHP GH
DOÕFÕQÕQ ELOPHVL JHUHNHQ úLIUHOHPH DQDKWDUÕ ùHNLO ¶GDNL
DQDKWDUD\DUODUÕED÷ODQWÕVÕQGDQVLVWHPHND\GHGLOPHNWHGLU
B. MS Outlook E-3RVWDùLIUHOHPH(NOHQWL8\JXODPDVÕ
%X oDOÕúPD NDSVDPÕQGD JHOLúWLULOHQ LNLQFL X\JXODPD 06
2XWORRN SURJUDPÕQD HNOHQWL RODUDN DGG-in) .NET 2008
SODWIRUPX]HULQGHC# SURJUDPODPDGLOLLOHJHOLúWLULOPLúWLU
Eklenti X\JXODPDODUÕ SURJUDPODUÕQ \HWHQHNOHULQL DUWÕUPDN
LoLQ JHOLúWLULOHQ YH SURJUDPODUD HQWHJUH HGLOHELOHQ NoN
SURJUDPFÕNODUGÕU>17].
*HOLúWLULOHQHNOHQWLX\JXODPDVÕLOHúLIUHOLH-SRVWDJ|QGHUPH
YH DOPD LúOHPOHUL EDúDUÕOÕ ELU úHNLOGH JHUoHNOHúWLULOPLúWLU
ùHNLO ¶GD úLIUHOL H-SRVWD J|QGHULPLQH LOLúNLQ 06 2XWORRN
SURJUDPÕQÕQHNUDQJ|UQWVVXQXOPDNWDGÕU
Proceedings/Bildiriler Kitabı
336
ùHNLO062XWORRNHNOHQWLVLJHOHQNXWXVXúLIUHo|]PHHNUDQÕ
V. GELECEKTE YAPILACAK Ç$/,ù0$/$5
*HUoHNOHúWLULOHFHN VRQUDNL oDOÕúPDODUGD H-posta kontrol
X\JXODPDVÕ YH 06 2XWORRN H-SRVWD úLIUHOHPH HNOHQWL
X\JXODPDVÕQGD H-SRVWD LoHULNOHULQGH \HU DODQ IDUNOÕ
WUOHUGHNL GRV\D HNOHULQLQ KÕ]OÕ YH HWNLQ úLIUHOHQPHVL LoLQ
WDVDUODQDQ DOJRULWPDQÕQ JHOLúWLULOPHVL SODQODQPDNWDGÕU
$OJRULWPD úLIUHOHPHGH X\JXODQDQ EORN ED]ÕQGD \HU
GH÷LúWLUPH ELW ED]ÕQGD G|QGUPH YH DQDKWDU GH÷HUL LOH
úLIUHOHPH IRQNVL\RQXQGDQ JHoLUPH LúOHPOHUL LOH úLIUH NÕUPD
VDOGÕUÕODUÕQDNDUúÕGLUHQoOLROPDVÕQDUD÷PHQWPDQDKWDUODUÕQ
GHQHQGL÷L NDED NXYYHW EUXWH IRUFH VDOGÕUÕODUÕQGD JHUHNOL
KHVDSODPDJFDQDKWDUÕQX]XQOX÷XLOHGR÷UXRUDQWÕOÕRODUDN
DUWDFD÷ÕQGDQ úLIUHQLQ NÕUÕOPD\D NDUúÕ JoOHQGLULOPHVL LoLQ
VRQUDNL oDOÕúPDODUGD DQDKWDU ER\XWX DUWWÕUÕODUDN úLIUHOHPH
YHELWRODUDNJHUoHNOHúWLULOHFHNWLU
$\UÕFD oDOÕúPDGD WDVDUODQDQ úLIUHOHPH DOJRULWPDVÕ
DVLPHWULN úLIUHOHPH DOJRULWPDODUÕ LOH JoOHQGLULOHUHN KLEULG
ELU úLIUHOHPH DOJRULWPDVÕ JHOLúWLULOPHVL SODQODQPDNWDGÕU
*HOLúWLULOHFHN KLEULG DOJRULWPD LOH DQDKWDU SD\ODúÕPÕQGD
NXOODQÕODQ DoÕN DQDKWDU DOW\DSÕODUÕ oDOÕúPDGD \HU DODQ
uygulamalara entegre edilebilecektir.
20-21 September /Eylül 2013 | Ankara / TURKEY
6. ULUSLARARASI
%é/*é*µ9(1/éçéYH.5é372/2-é
.21)(5$16,
6th INTERNATIONAL
INFORMATION SECURITY & CRYPTOLOGY
CONFERENCE
VI. S218d9(KAZANIMLAR
%XoDOÕúPD\ODKHUJHoHQJQGDKDGD\D\JÕQODúPDNWa olan
e-SRVWD NXOODQÕPÕQÕQ GDKD JYHQLOLU ROPDVÕ VD÷ODQPÕúWÕU
dDOÕúPDGD ELOLQHQ \D\JÕQ NXOODQÕODQ úLIUHOHPH DOJRULWPDODUÕ
GÕúÕQGD \HQL ELU DOJRULWPD JHOLúWLULOPLúWLU DES, AES ve
%ORZILVK JLEL VLPHWULN úLIUHOHPH DOJRULWPDODUÕ \D\JÕQ
NXOODQÕODQ YH ELOLQHQ DOJRULWPDODU ROPDVÕ VHEHEL\OH internet
RUWDPÕQGD EX DOJRULWPDODUÕQ NÕUÕOPDODUÕQD \|QHOLN oHúLWOL
DUDoODU YH oDOÕúPDODU EXOXQPDNWDGÕU %X oDOÕúPDGD
JHOLúWLULOHQ úLIUHOHPH DOJRULWPDVÕQÕQ |]JQ ROPDVÕ, en
D]ÕQGDQ SURJUDPODPD ELOJLVL ROPDGDQ KD]ÕU DUDoODUÕ
kullanarak zaman zaman úLIUHNÕUPDNRQXVXQGD EDúDUÕOÕRODQ
N|WQL\HWOLNLúLOHULQKHGHILROPDNWDQNXUWDUPDNWDGÕU
8\JXODPD úLIUHOHPH |]HOOL÷L VD\HVLQGH JYHQOLN
NRQXVXQGDJHWLUHFH÷LDYDQWDMODUDHNRODUDNFUHWVL]H-posta
VHUYLV VD÷OD\ÕFÕODUÕQÕQ L]LQ YHUGL÷L |OoGH VXQXFXODUD
HULúPHNWH YH \DSÕODQ NRQILJUDV\RQODUD J|UH LVWHQLOHQ
KHVDEÕQ WP H-SRVWDODUÕQÕ X\JXODPD NHQGL YHULWDEDQÕQD
\NOH\HELOPHNWHGLU
*PDLO <DKRR +RWPDLO JLEL FUHWVL] H-posta servis
VD÷OD\ÕFÕODUÕQ NXOODQÕP V|]OHúPHVLQGH EHOLUWWL÷L ]HUH;
NXOODQÕFÕ H-SRVWDODUÕ EX VHUYLV VD÷OD\ÕFÕODU WDUDIÕQGDQ
LVWHQLOGL÷LQGH VLOLQHELOPHNWH YH\D oQF NLúLOHUOH
SD\ODúÕODELOPHNWHGLU%XoDOÕúPDVD\HVLQGHH-postalar servis
VD÷OD\ÕFÕODU WDUDIÕQGDQ VLOLQPH GXUXPXQD NDUúÕQ NRUXPD
DOWÕQD DOÕQPÕú ROPDNWDGÕU $\UÕFD H-SRVWDODU LVWHQLOGL÷LQGH
úLIUHOHQHUHN J|QGHUPH LúOHPLQH WDEL WXWXOGX÷X LoLQ ELOJLOHU
oQF NLúLOHULQ HOLQH JHoVH GDKL J|QGHULOHQ H-SRVWD LoHUL÷L
DQODúÕOPDPDNWDGÕU
REFERANSLAR
[13]
[14]
[15]
[16]
[17]
International Journal of Emerging Technology and Advanced
Engineering, Vol. 1, pp. 6-12, 2011.
ViNLSHGL³*L]OL$QDKWDUOÕùLIUHOHPH´
http://tr.wikipedia.org/wiki/Gizli_anahtarl%C4%B1_%C5%9Fifrele
me(ULúLP5.2013).
R. Sureswaran YH DUN ³$FWLYH (-mail system protocols monitoring
DOJRULWKP´ TENCON 2009 - 2009 IEEE Region 10
Conference, 2010.
Vikipedi, http://tr.wikipedia.org/wiki/SMTP(ULúLP12.06.2013.
PURJUDPODPD7Y ³7HOQHW iOH 3RS 6XQXFX\D %D÷ODQPD YH 0DLO
øúOHPOHUL´
http://www.programlamatv.com/ders/bilisim/telnet-ilepop3-sunucuya-baglanma-ve-mail-islemleri/, (ULúLP.2012).
J. Boyce, B. Sheresh ve D. Sheresh, ³0LFURVRIWŠ 2IILFe OXWORRNŠ
2007´ O'Reilly Media, Inc., 2009.
Muhammet Serkan Çinar, \ÕOÕQGD 'RNX] (\OO
hQLYHUVLWHVL %LOJLVD\DU 0KHQGLVOL÷L E|OPQGHQ \NVHN
OLVDQV GHUHFHVL DOPÕúWÕU ùX DQGD Hacettepe hQLversitesi
Bilgisayar 0KHQGLVOL÷L E|OPQGH GRNWRUD |÷UHQFLsidir.
,379WDEDQOÕX]DNWDQH÷LWLP \D]ÕOÕPPKHQGLVOL÷L ELOLúLP
JYHQOL÷L YH VHPDQWLN ZHE DODQODUÕQGD oDOÕúPDODU
\DSPDNWDGÕU
,úÕO Çinar, Gazi hQLYHUVLWHVL Bilgisayar 0KHQGLVOL÷L
E|OPQGH \NVHN OLVDQV \DSPDNWDGÕU %LOLúLP JYHQOL÷L
YHUL PDGHQFLOL÷L, LQVDQ ELOJLVD\DU HWNLOHúLPL DODQODUÕQD LOJL
GX\PDNWDGÕU
+DVDQ ùDNLU %LOJH \ÕOÕQGD <ÕOGÕ] 7HNQLN
hQLYHUVLWHVL %LOJLVD\DU 0KHQGLVOL÷L E|OPQGHQ PH]XQ
ROGX\ÕOÕQGD.ÕUÕNNDOHhQLYHUVLWHVL(OHNWULN-Elektronik
0KHQGLVOL÷L $QDELOLP 'DOÕ
QGD \NVHN OLVDQVÕQÕ \ÕOÕQGD
%DúNHQW
hQLYHUVLWHVL
(OHNWULN-Elektronik
0KHQGLVOL÷L $QDELOLP 'DOÕ
QGD GRNWRUDVÕQÕ WDPDPODGÕ
*D]L hQLYHUVLWHVL %LOJLVD\DU 0KHQGLVOL÷L E|OPQGH 2003
\ÕOÕQGD \DUGÕPFÕ GRoHQW XQYDQÕQÕ YH \ÕOÕQGD GRoHQW
XQYDQÕQÕDOGÕ
[1]
D. Choukse, U.K.
Singh, L. Laddhani ve R. Shahapurkar,
“Designing secure email infrastructure´ Wireless and Optical
Communications Networks (WOCN), 1964, pp. 1–9, 2012.
[2] ù %D\]DQ
³(-3RVWD *YHQOL÷L 1HGHQ gQHPOLGLU"´
http://www.guvenliweb.org.tr/guvenlik/node/40
(ULúLP
08.07.2013).
[3] $005DR³Policy Specification and Enforcement for Detection of
Security
Violations
in
a
Mail
Service
´
9th International Conference on Information Technology , pp. 172–
175, 2006.
[4] A. Ghafoor, S. Muftic ve G. 6FKP|O]HU,´ CryptoNET: Design and
implementation of the Secure Email System´ 2009 Proceedings of
the 1st International Workshop on Security and Communication
Networks (IWSCN), pp. 1–6, 2009.
[5] S.J. Stolfo, S. Hershkop, Ke Wang ve O. Nimeskern,´ EMT/MET:
systems for modeling and detecting errant email´ DARPA
Information Survivability Conference and Exposition, vol. 2, pp.
290–295, 2003.
[6] 0 7DNHVXH ³(-mail Sender Identification through Trusted Local
Deposit-$JHQWV´IEEE Conf, 2011 14th International Conference on
Network-Based Information Systems (NBiS), pp. 84–91, 2011.
[7] G.Bahadur, Chan ve W.Weber ³3ULYDF\ 'HIHQGHG 3URWHFWLQJ
<RXUVHOI2QOLQH´Que, Chapter 8, 2002.
[8] A. Levi ve M.U. Caglayan, "(OHNWURQLN 3RVWD *YHQOL÷L YH $oÕN
$QDKWDU6XQXFXODUÕ", %LOLúLP7%'%LOLúLP.XUXOWD\Õ, pp. 114117, 1997.
[9] D. Zissis, ve D. Lekkas, "Addressing cloud computing security
issues", Future Generation Computer Systems, pp.583-592, 2012.
[10] TropSoft,"DES
Overview",
http://www.tropsoft.com/strongenc/des.htm(ULúLP
[11] A. Nadeem, "A Performance Comparison of Data Encryption
Algorithms", IEEE, 2005.
[12] J. Thakur, ve K. Nagesh, "DES, AES and Blowfish: Symmetric Key
Cryptography Algorithms Simulation Based Performance Analysis.",
20-21 September /Eylül 2013 | Ankara / TURKEY
337
Proceedings/Bildiriler Kitabı

Benzer belgeler

PDF ( 2 )

PDF ( 2 ) LoHUPHGHQ JHQ DOW NPHOHULQL YHULQLQ \DSÕVÕQD EDNDUDNVHoPHNWHGLU:UDSSHUWHNQL÷LQGHLVHPDNLQH |÷UHQPHVL DOJRULWPDODUÕ NXOODQÕOPDNWDGÕU >@ 3HUIRUPDQVÕ DUWWÕUPDN YH HQ L\L YHUL...

Detaylı

DNS Güçlendirme Saldırısı RisN Analizi

DNS Güçlendirme Saldırısı RisN Analizi 7/¶ye ve \DSÕODQ LúOHP PLNWDUÕQÕQ GD  PLO\RQX EXOPDVÕ beklenmektedir [2]. 'Q\DQÕQ GL÷HU ONHOHULQGH GH ,78 (International Telecommunication Union) verilerinHJ|UH PLO\DU NLúLQL...

Detaylı

TELEFON HATTI ÜZERİNDEN PIC - KULIS

TELEFON HATTI ÜZERİNDEN PIC - KULIS NRGODUÕ DVP  ELU 3&¶GHQ VHUL SRUW DUDFÕOÕ÷Õ LOH YHULFL WDUDIWDNL PLNURGHQHWOH\LFL\H J|QGHULOPHNWHGLU %X PLNURGHQHWOH\LFL LOJLOL DOÕFÕ WDUDIÕ DUD\ÕS PDNLQH NRGODUÕQD LOLúNLQ ...

Detaylı

PowerFocus CMS

PowerFocus CMS HQFRGHUOHULX]DNWDQD\DUODPD\ÕGHVWHNOHU ‡dRNOXPRQLW|U,3NDPHUD\DNDGDUJ|VWHULU ‡%LWRUDQÕJ|VWHUJHVLKHUJ|UQW\D\ÕQÕLoLQD÷NXOODQÕPÕ RUDQÕQÕJ|VWHULU%|\OHFHEDQGJHQLúOL÷LNXOODQÕP...

Detaylı

Toplu Taşımada En Az Aktarma Kriterine Göre Seyahat Planlama

Toplu Taşımada En Az Aktarma Kriterine Göre Seyahat Planlama VLVWHPYEDUDoODUNXOODQÕODUDNKÕ]OÕELUúHNLOGHoRN ID]ODVD\ÕGD\ROFX\XWDúÕPDNEXQRNWDODUDUDVÕQGDNL NDUD\ROXWUDIL÷LQLFLGGLRUDQGDUDKDWODWPDNWDGÕU%X |QHPOLQRNWDODULOHúHKULQGL÷HUN...

Detaylı

Siber Saldırı Hedefleri ve TürNiye`de Siber GüvenliN Stratejisi

Siber Saldırı Hedefleri ve TürNiye`de Siber GüvenliN Stratejisi \|QHWPHN LoLQ NRQWURO PHUNH]LQL NXOODQPDN SHQHWUDV\RQ WHVWOHULQL \DSPDN JoO NLPOLN GR÷UXODPD DOJRULWPDODUÕQÕQ NXOODQÕOPDVÕQÕ VD÷ODPDN YH ORJ WDNLSOHULQLQ \DSÕOPDVÕQD |QHP YHU...

Detaylı

AES BloN Şifresinin Anahtar Genişletme Rutininin Geliştirilmesi ve

AES BloN Şifresinin Anahtar Genişletme Rutininin Geliştirilmesi ve %X oDOÕúPDGD $(6 EORN úLIUHVLQGH NXOODQÕODQ DQDKWDU JHQLúOHWPH UXWLQL LQFHOHPLú YH EX UXWLQGHNL SUREOHPOHU LUGHOHQPLúWLU $(6 EORN úLIUHVLQLQ DQDKWDU JHQLúOHWPH UXWLQLQGHNL ]DDI...

Detaylı

GenetiN Algoritma ve TeNil Değer Ayrışımı Tabanlı Yeni Bir Kırılgan

GenetiN Algoritma ve TeNil Değer Ayrışımı Tabanlı Yeni Bir Kırılgan ùLIUHOHPHLúOHPLQHJHOHQNDUDNWHUOLNGL]LLONRODUDN\HU GH÷LúWLUPHLúOHPLQHWDELWXWXOXUøONNDUDNWHUYHVRQ NDUDNWHU\HUGH÷LúWLULU Detaylı