Özgün Bir Şifreleme Algoritması Kullanan Güvenli E
Transkript
6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, g]JQ%LUùLIUHOHPH$OJRULWPDVÕ.XOODQDQ *YHQOL(-3RVWD8\JXODPDVÕ 0XKDPPHW6HUNDQdLQDU,úÕOdLQDU+DVDQùDNLU%LOJH g]HW—%X oDOÕúPD LOH KHU JHoHQ JQ \D\JÕQODúPDNWD RODQ \NVHN NDSDVLWHOL YH FUHWVL] RODUDN GD÷ÕWÕODQ H-posta KL]PHWOHULQLQ GDKD JYHQLOLU NÕOÕQPDVÕ DPDoODQPÕúWÕU (-posta LúOHPOHUL LoLQ ELOLQHQ YH \D\JÕQ NXOODQÕODQ úLIUHOHPH DOJRULWPDODUÕQÕQ GÕúÕQGD \HQL ELU úLIUHOHPH DOJRULWPDVÕ WDVDUODQPÕúWÕU 7DVDUODQDQ úLIUHOHPH DOJRULWPDVÕ\OD JHOLúWLULOHQ e-SRVWDX\JXODPDVÕJYHQOLNNRQXVXQGDJHWLUHFH÷LDYDQWDMODUÕQ \DQÕQGD FUHWVL] e-SRVWD VHUYLV VD÷OD\ÕFÕODUÕQÕQ L]LQ YHUGL÷L |OoGHVXQXFXODUDHULúPHNWHYH\DSÕODQNRQILJUDV\RQODUDJ|UH LVWHQLOHQ KHVDEÕQ WP H-SRVWD YHULOHULQL NHQGL YHULWDEDQÕQD \NOH\HELOPHNWHGLU $\UÕFD úLIUHOHPH DOJRULWPDVÕ 06 Outlook SURJUDPÕQDHNOHQWLRODUDNJHOLúWLULOHQ EDúNDELUX\Julamaya da entegre edilerek kurumsal e-SRVWDLOHWLPLQGHGHJYHQOLH-posta J|QGHULOPHVL VD÷lanmÕúWÕU. Her iki uygulamada GD úLIUHOHPH DOJRULWPDVÕEDúDUÕOÕELUúHNLOGHJHUoHNOHúWLULOPLúWLU Anahtar Kelimeler— E-SRVWD *YHQOL÷L 323 YH 6073 3URWRNROOHUL6LPHWULNùLIUHOHPH Secure Email Application Using an Original Encryption Algorithm Abstract—In this study, email services which are distributed free with high storage capacity and which become widespread every day is intended to made more reliable. A new encryption algorithm is designed for email operations which is out of the known and widely used email encryption algorithms. Besides the advantages of security issues of the email application that is developed with proposed encryption algorithm, mail application can access to the email servers to the extent permitted by free email service providers and all of the data in desired email account can be downloaded into application database according to configurations. Furthermore, the encryption algorithm has been integrated into the add-in application developed for MS Outlook program and by this way the secure message sending is provided for organizational email transmissions. The encryption algorithm was implemented successfully for both applications. Keywords² Email Security, POP3 and SMTP Protocols, Symmetric Encryption. I. Gø5øù 6UHNOLDUWPD\DGHYDPHGHQELOJLYHEHUDEHULQGHJHWLUGL÷L ELOJL GH÷LúLPL Lú VUHNOLOL÷LQGH YH NXUXPODUÕQ JHOLúPHVLQGH E\N URO R\QDPDNWDGÕU %LOJL GH÷LúLPLQGH ELUoRN PHWRW EXOXQPDVÕQD UD÷PHQ H-SRVWD WP NXUXPODU LoLQ LOHWLúLP DUDoODUÕDUDVÕQGDLONVÕUDGDJHOPHNWHGLU>1]. *QP]GH H-SRVWDODU NXUXPVDO LOHWLúLPLQ \DQÕQGD ELUH\VHO LOHWLúLP LoLQ GH YD]JHoLOHPH\HFHN GHUHFHGH |QHPOL ELU KDEHUOHúPH DUDFÕGÕU øOHWLúLPLQ \NVHN RUDQODUGD HM.S.Çinar+DFHWWHSHhQLv%LOJ0KH-posta:([email protected]). ,dLQDU *D]LhQLY%LOJ0KH-posta: ([email protected]). +ù%LOJH'Ro'U*D]LhQLY%LOg0KH-posta:([email protected]). Proceedings/Bildiriler Kitabı 332 SRVWDODUDUDFÕOÕ÷Õ\OD\DSÕOPDVÕEXLOHWLúLP]HULQGHQ\DSÕODQ VDOGÕUÕODUÕQ GD DUWPDVÕQD VHEHS ROPXúWXU .XUXPODUÕQ úLUNHWOHULQ ELUH\VHO NXOODQÕFÕODUÕQ H-SRVWD JYHQOL÷L NRQXVXQGD|QOHPDOPDODUÕLKWL\DoKDOLQHJHOPLúWLU>]. øQFHOHQHQ oDOÕúPDODUGD H-SRVWD VLVWHPOHUL JYHQOL÷L NRQXVX JHQHO RODUDN LúOHWLP VLVWHPL VHYL\HVLQGe, e-posta X\JXODPDVÕ VHYL\HVLQGH YH D÷ DOW\DSÕVÕ VHYL\HVLQGH HOH DOÕQPDNOD ELUOLNWH H-SRVWD VXQXFXVX YH LVWHPFL DUDVÕQGDNL LOHWLúLPLQ JYHQOL÷L JYHQOL RWXUXP \|QHWLPL EDVLW YH kriptografik anahtarlar, onay meVDMODUÕ LOH H-posta takibi, spam PHVDMODUÕQ HOHQPHVL ]DUDUOÕ H-posta takibi gibi JYHQOLNOH LOJLOL oRN IDUNOÕ NRQXODUGD oDOÕúPDODU \DSÕOGÕ÷Õ J|UOPúWU>3,4,5,6]. <DSÕODQ EX oDOÕúPDGD H-posta sistemlerinin uygulama VHYL\HVLQGHNLJYHQOL÷LGLNNDWHDOÕQDUDN|]JQELUDOJRULWPD LOHúLIUHOHPHLúOHPL JHUoHNOHúWLULOPHNWHGLU %X oDOÕúPDGD |]HOOLNOH OLWHUDWUGH NDUúÕODúÕODQ [7, 8] VDOGÕUJDQÕQ J|QGHULFL LOH DOÕFÕ DUDVÕQGD PHVDM WUDIL÷LQL GLQOH\HELOL\RUROPDVÕYHPHVDMÕGH÷LúWLUHELOPHVLH-SRVWDODUÕQ úLIUHVL]RODUDNVXQXFXYHELOJLVD\DUODUGDWXWXOX\RUROPDVÕYH JHQHORODUDNNXOODQÕFÕKDWDODUÕLOHGRQDQÕP\D]ÕOÕPDoÕNOÕNODUÕ JLELWHKGLWOHULQHQJHOOHQPHVLKHGHIOHQPLúWLU %XOXW ELOLúLP LOH NXOODQÕFÕ YHULOHULQLQ E\N ELU NÕVPÕQÕQ EXOXW ]HULQGH RODFD÷Õ |QJ|UOPHNOH ELUOLNWH \NVHN NDSDVLWHOL FUHWVL] H-posta VD÷OD\ÕFÕODU GD NXOODQÕFÕODUÕ LoLQ ELU EXOXW RUWDPÕ VD÷ODPDNWDGÕUODU %XOXW ELOLúLP VHUYLV modellerinden VHUYLV RODUDN VXQXODQ \D]ÕOÕP (Software as a Service) \DNODúÕPÕQGD NXOODQÕFÕODUÕQ VHUYLV VD÷OD\ÕFÕODUÕQ EXOXW DOW\DSÕVÕQÕ NXOODQDUDN ZHE WDEDQOÕ H-posta X\JXODPDODUÕQD IDUNOÕ FLKD]ODUGDQ IDUNOÕ DUD\]OHUOH HULúHELOPHOHUL PPNQ NÕOÕQPDNWDGÕU %X \DNODúÕPGD kXOODQÕFÕ\D |]J VÕQÕUOÕ NRQILJUDV\RQ D\DUODPDODUÕ \DSÕODELOPHNWH ROXS NXOODQÕFÕQÕQ GHSRODPD RUWDPÕQÕ LúOHWLP VLVWHPOHULQLYHD÷DOW\DSÕVÕQÕNRQWUROHWPHVLYH\D\|QHWPHVL PPNQROPDPDNWDGÕU [9]. .XOODQÕFÕODU WP e-SRVWD YHULOHULQL EXOXW ]HULQe WDúÕGÕNODUÕQGD ED]Õ |]HO JL]OLOLN GHUHFHOL YHULOHULQLn úLIUHOL olarak bu e-SRVWD VHUYLV VD÷OD\ÕFÕODUÕQGD WXWXOPDVÕQÕ LVWH\HELOHFHNOHUGLU hFUHWVL] RODUDN VD÷ODQDQ EX \NVHN NDSDVLWHOL YH KL]PHW GHYDPOÕOÕ÷Õ RODQ H-posta hizmet VD÷OD\ÕFÕODUÕEXELOJLOHULED÷OÕEXOXQGXNODUÕGHYOHWLQJYHQOLN ELULPOHUL YH\D oQF úDKÕVODU LOH SD\ODúDELOHFHNOHULQL EHOLUWPHNOH EHUDEHU LVWHGLNOHUL ]DPDQ NXOODQÕFÕODUÕQÕQ KHVDSODUÕQÕ NDSDWDELOHFHNOHULQL NXOODQÕFÕ V|]OHúPHOHULQGH LIDGH HWPHNWHGLUOHU %X DoÕODUGDQ EDNÕOGÕ÷ÕQGD VRQ NXOODQÕFÕODU LoLQ EX FUHWVL] e-posta servis VD÷OD\ÕFÕODUÕQÕQ VXQXFXODUÕQGD e-SRVWD YHULOHULQLQ úLIUHOL WXWXOPDVÕ YH \DOQÕ]FD DQDKWDUODUÕQÕ SD\ODúWÕNODUÕ NLúLOHUOH úLIUHOL H-posta LOHWLPOHULQL JHUoHNOHúWLUPHOHUL NLúLVHO ELOJLOHULQLQ 20-21 September /Eylül 2013 | Ankara / TURKEY 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE PDKUHPL\HWLQLQ NRUXQPDVÕ KXVXVXQGD |QHPOL ELU JYHQOLN PHNDQL]PDVÕVD÷OD\DFDNWÕU dDOÕúPDGD |QHULOHQ \DNODúÕP XoWDQ XFD her seviyede JYHQOL÷L VD÷ODPD\D \|QHOLN RODUDN |QHULOPLú ELU o|]P olmamakla beraber, e-SRVWD PHVDMODUÕ úLIUHOHPHVLQLQ \D\JÕQ RODUDN NXOODQÕODQ úLIUHOHPH DOJRULWPDODUÕ GÕúÕQGD IDUNOÕ ELU DOJRULWPDLOHVD÷ODQPDVÕQÕKHGHIOHPLúWLU /LWHUDWUGH\DSÕODQ DUDúWÕUPDODUGD VLPHWULN úLIUHOHPHGH DES, 3DES, AES ve Blowfish [10,11,12@ DOJRULWPDODUÕQÕQ \D\JÕQ RODUDN NXOODQÕOGÕ÷Õ J|UOPúWU E-SRVWD JYHQOL÷LQH \|QHOLN VLPHWULN úLIUHOHPH DOJRULWPDODUÕ NXOODQDUDN \DSÕODQ oDOÕúPDODUGD ise genellikle bahsedilen VLPHWULN úLIUHOHPH DOJRULWPDODUÕNXOODQÕOGÕ÷ÕJ|]OHPOHQPLúWLU %XoDOÕúPDGDLVH IDUNOÕ úLIUHOHPH WHNQLNOHUL DOJRULWPDQÕQ IDUNOÕ DGÕPODUÕQGD X\JXODQDUDN |]JQ ELU VLPHWULN úLIUHOHPH algoritmaVÕ JHOLúWLULOPLúWLU dDOÕúPDQÕQ LNLQFL E|OPQGH JHOLúWLULOHQ VLPHWULN úLIUHOHPH DOJRULWPDVÕQGDQ EDKVHGLOPHNWH oQF E|OPGH e-SRVWD J|QGHUPH YH DOPD LoLQ JHUHNOL SURWRNROOHULQ DoÕNODPDVÕ\DSÕOPDNWDYHELUVRQUDNLE|OPGHGHJHOLúWLULOHQ e-SRVWD X\JXODPDODUÕ DQODWÕOPDNWDGÕU %HúLQFL E|OPGH JHOHFHNWH \DSÕOPDVÕ SODQODQDQ oDOÕúPDODU |]HWOHQPHNWHGLU 6RQ RODUDN oDOÕúPDGDQ HOGH HGLOHQ ND]DQÕPODU YH VRQXoODU VXQXOPXúWXU 2) 3) 4) 5) 6) 7) 8) G|QúWUOPHVL YH EX GH÷HULQ ELW VHYL\HVLQGH oHúLtli IRQNVL\RQODUGDQJHoLULOPHVLQLNDSVDPDNWDGÕU ùLIUHOHPHLúOHPLQHJHOHQNDUDNWHUOLNGL]LLONRODUDN\HU GH÷LúWLUPHLúOHPLQHWDELWXWXOXUøONNDUDNWHUYHVRQ NDUDNWHU\HUGH÷LúWLULU <HU GH÷LúWLUPH LúOHPLQGHQ VRQUD NDUDNWHUOLN EORN bitlik sa\ÕVDOELUGH÷LúNHQHDNWDUÕOÕUøONNDUDNWHUELWLQ LON ELWLQL WHPVLO HGHU %X VD\ÕVDO GH÷HU DQDKWDU GL]HVLQLQKHUELUNDUDNWHULQGHQHOGHHGLOHQVD\ÕVDOGH÷HU NDGDUG|QGUPHLúOHPLQHWXWXOXU '|QGUPH LúOHPLQLQ NDo NH] \DSÕODFD÷Õ DQDKWDU dizesindeki her ELU NDUDNWHULQ VD\ÕVDO GH÷HULQLQ LOH E|OQPHVLQGHQNDODQGH÷HULOHEHOLUOHQLU '|QGUPHLúOHPLQGHQVRQUDHOGHHGLOHQYHULLOHELWOLN VD\ÕVDO GH÷HUH DWDQDQ DQDKWDU DUDVÕQGD ;25 LúOHPL JHUoHNOHúWLULOLU ùLIUHOHQPLúVD\ÕVDO GH÷HURQDOWÕOÕNVD\ÕWDEDQÕQGDVWULQJ GL]HVLQHG|QúWUOU'|QúWUPHLúOHPLVRQUDVÕúLIUHOL EORNHOGHHGLOPLúROXU 'L÷HU NDUDNWHUOLN EORNODU LoLQ D\QÕ LúOHPOHU WHNUDU edilir. 6RQ NDODQ EORN NDUDNWHUGHQ GDKD D] LVH JHUHNWL÷L NDGDU ³´ NDUDNWHUL \HUOHúWLULOHUHN NDUDNWHUH WDPDPODQÕU II. E-POSTA Id(5ø.ùø)5(/(0(A/*25ø70$6, ùLIUHOHPHDOJRULWPDVÕQGDJL]OLDQDKWDUOÕúLIUHOHPH\|QWHPL NXOODQÕOPÕúWÕU *L]OL DQDKWDUOÕ úLIUHOHPH \|QWHPLQGH KHP úLIUHOHPH KHP GH úLIUH o|]PH LúOHPL LoLQ D\QÕ DQDKWDU kullaQÕOPDNWDGÕU %X \|QWHP VLPHWULN úLIUHOHPH RODUDN GD DGODQGÕUÕOPDNWDGÕU 6LPHWULN úLIUHOHPHGH DQDKWDUÕQ DOÕFÕ WDUDIÕQD JYHQOL ELU úHNLOGH LOHWLOPHVL |QHPOLGLU $QDKWDU ROPDGÕ÷ÕVUHFHúLIUHOHQPLúPHWLQHOHJHoLULOVHGHDVÕOPHWQLQ HOGH HGLOPHVL PPNQ GH÷Lldir [13]. ùHNLO ¶GH VLPHWULN úLIUHOHPH DOJRULWPDODUÕQÕQ oDOÕúPD \DSÕVÕ DQD KDWODUÕ\OD J|VWHULOPHNWHGLU ùHNLOùLIUHOHPHDOJRULWPDVÕDNÕúGL\DJUDPÕ ùHNLO6LPHWULNúLIUHOHPHDOJRULWPDVÕoDOÕúPD\DSÕVÕ A. ùLIUHOHPH$OJRULWPDVÕ dDOÕúPDQÕQ EX E|OPQGH JHOLúWLULOHQ DOJRULWPDGD X\JXODQDQ úLIUHOHPH DGÕPODUÕ HOH DOÕQPÕú ROXS úLIUHOHPH DOJRULWPDVÕùHNLO¶GHDNÕúGL\DJUDPÕRODUDNVXQXOPXúWXU 1) ùLIUHOHPH DOJRULWPDVÕ KHU bir 8 karakterin blok olarak DOÕQÕS NDUDNWHUOLN GL]LQLQ ELWOLN VD\ÕVDO GH÷HUH 20-21 September /Eylül 2013 | Ankara / TURKEY B. ùLIUHd|]PH$OJRULWPDVÕ dDOÕúPDQÕQ EX E|OPQGH LVH JHOLúWLULOHQ DOJRULWPDGD X\JXODQDQúLIUHo|]PHDGÕPODUÕHOHDOÕQPÕúROXSúLIUHo|]PH DOJRULWPDVÕùHNLO¶GHDNÕúGL\DJUDPÕRODUDNVXQXOPXúWXU. 1) ùLIUH o|]PH DOJRULWPDVÕ úLIUHOHPH DOJRULWPDVÕQGD izlenen yolun tersidir. Her ELU RQDOWÕOÕN VLVWHPGHNL GH÷HU EORN RODUDN DOÕQÕS ELWOLN VD\ÕVDO GH÷HUH G|QúWUOHUHN ELW VHYL\HVLQGH oHúLWOL IRQNVL\RQODUGDQ JHoLULOLU 333 Proceedings/Bildiriler Kitabı 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE 2) ùLIUH o|]PH LúOHPLQH JHOHQ karakter RQDOWÕOÕN VLVWHPGHNL GH÷HU ELWOLN VD\ÕVDO GH÷HUH G|QúWUOU 3) (OGH HGLOHQ VD\ÕVDO GH÷HU LOH ELWOLN VD\ÕVDO GH÷HUH DWDQDQDQDKWDUDUDVÕQGD;25LúOHPLJHUoHNOHúWLULOLU%X VD\ÕVDO GH÷HU DQDKWDU GL]HVLQLQ KHU ELU NDUDNWHULQGHQ elde edilen VD\ÕVDO GH÷HUNDGDUG|QGUPH LúOHPLQH WDEL tutulur. 4) '|QGUPH LúOHPLQLQ NDo NH] \DSÕODFD÷Õ DQDKWDU dizesindeki her ELU NDUDNWHULQ VD\ÕVDO GH÷HULQLQ LOH E|OQPHVLQGHQHOGHHGLOHQNDODQGH÷HULQVD\ÕVÕQGDQ oÕNDUÕOPDVÕ\ODEHOLUOHQLU 5) '|QGUPH LúOHPL VRQXFX HOGH HGLOHQ VD\ÕVDO GH÷HU VWULQJH G|QúWUOU 6WULQJ GL]HVL bitlik yer GH÷LúWLUPHLúOHPLQH (ilk 4 karakter ve son 4 karakter yer GH÷LúWLULUWDELWXWXODUDNúLIUHVL]EORNHOGHHGLOLU 6) *HUL\H NDODQ EORNODU LoLQ GH D\QÕ LúOHPOHU JHUoHNOHúWLULOHUHN úLIUHVL]PHWLQHOGHHGLOLU 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, D\DUODUÕ \DSPDN YH JHOHQ H-SRVWDODUÕ DOPDN LoLQ JHUHNOL LúOHPOHUL\DSPDNDPDFÕ\ODWHOQHWNXOODQÕOPÕúWÕU 7HOQHWOH ELU VXQXFX\D ED÷ODQPDN LoLQ |QFHOLNOH VXQXFXQXQ DGUHVL YH oDOÕúWÕ÷Õ SRUWX JLUPHN JHUHNPHNWHGLU *HQHOOLNOH SRUW LoLQ YDUVD\ÕODQ GH÷HU ¶GXU %X LúOHPLQ sonunda sunucu helo mesajÕ J|QGHUPHNWH YH ED÷ODQWÕQÕQ KD]ÕU ROGX÷XQX EHOLUWPHNWHGLU <DSÕODQ LúOHPOHU GR÷UX ROGX÷XVUHFH2.LOHFHYDSDOÕQPDNWDGÕU %D÷ODQWÕVD÷ODQGÕNWDQVRQUD³86(5´NRPXWX\ODNXOODQÕFÕ NRGX YH ³3$66´ NRPXWX\OD úLIUH JLULOHUHN VXQXFX\D HULúLP VD÷ODQPDNWDGÕU Bu DúDPDGDQ VRQUD oDOÕúPD VÕUDVÕQGD NXOODQÕODQ |QHPOL NRPXWODUYHJ|UHYOHULDúD÷ÕGDEHOLUWLOPLúWLU>]: STAT: *HOHQ NXWXVXQGD NDo DGHW H-SRVWD ROGX÷XQX J|VWHUPHNWHGLU67$7NRPXWXNXOODQÕODUDNJHOHQNXWXVXQGD e-SRVWD ROXS ROPDGÕ÷Õ YH NDo \HQL H-posta geldi÷LQLQ NRQWURO\DSÕOPÕúWÕUùHNLO LIST: Gelen kutusundaki e-SRVWDODUÕQ VÕUDVÕQÕ YH KHU ELULQLQER\XWODUÕQÕJ|VWHUPHNWHGLUùHNLO ùHNLO/,67YH67$7NRPXWODUÕQÕQoDOÕúWÕUÕOPDVÕYH|UQHNVRQXoODU QUIT: 323 ED÷ODQWÕVÕQÕ VRQODQGÕUPDN LoLQ kullaQÕOPDNWDGÕU TOP: E-SRVWDLoHUL÷LQLQLVWHQLOHQVDWÕUDNDGDUJ|UOPHVLQL VD÷ODPDNWDGÕU ³723 ´ LIDGHVL QXPDUDOÕ H-SRVWDQÕQ VDWÕUÕQDNDGDUJ|UQWOHQPHVLQL VD÷ODPDNWDGÕU RETR: %X NRPXWOD ùHNLO ¶WH J|UOG÷ JLEL JHOHQ kutusundan istenilen e-SRVWDQÕQ VÕUD QXPDUDVÕ \D]ÕODUDN GHWD\OÕ RODUDN LoHULN ELOJLOHUL DOÕQDELOPHNWHGLU %XUDGDNL LoHULN VWDQGDUW e-SRVWDODUÕQ LoHUL÷LQH EHQ]HPHPHNWHGLU Buradaki bilgiler e-SRVWDQÕQRUMLQDOKDOLQLJ|VWHUPHNWHGLU ùHNLOùLIUHo|]PHDOJRULWPDVÕDNÕúGL\DJUDPÕ III. E-POSTA P5272.2//(5ø 323 3RVW 2IILFH 3URWRNRO SURWRNRO HOHNWURQLN SRVWD DOPDNLoLQVRQNXOODQÕFÕODUWDUDIÕQGDQNXOODQÕOPDNWDGÕU323 SURWRNROVD\HVLQGHNXOODQÕODQH-posta sunucusunda bulunan postalar yerel diske indirilebilmektedir [14]. Elektronik posta J|QGHUPH SURWRNRO 6LPSOH 0DLO Transfer Protocol), bir e-SRVWD J|QGHUPHN LoLQ VXQXFX LOH LVWHPFL DUDVÕQGDNL LOHWLúLP úHNOLQL EHOLUOH\HQ SURWRNROGU Sadece e-SRVWDJ|QGHUPHNLoLQNXOODQÕODQEXSURWRNROGH LVWHPFL ELOJLVD\DU 6073 VXQXFXVXQD ED÷ODQDUDN JHUHNOL NLPOLN ELOJLOHULQL J|QGHUPHNWH VXQXFXQXQ RQD\ YHUPHVL halinde gerekli e-postayÕ VXQXFX\D LOHWPHNWH YH ED÷ODQWÕ\Õ VRQODQGÕUPDNWDGÕU>15]. A. 7HOQHWLOH323YH60736XQXFXODUÕQD%D÷ODQPD Herhangi bir e-SRVWD VXQXFX\D ED÷ODQÕUNHQ QRUPDO ELU TCP/IP ED÷ODQWÕVÕ \DSÕOPDNWDGÕU 323 LOH LOJLOL JHUHNOL Proceedings/Bildiriler Kitabı 334 ùHNLO5(75NRPXWXQXQoDOÕúWÕUÕOPDVÕYH|UQHNVRQXoODU E-SRVWD LoHUL÷LQLQ EDúODPD YH ELWLúLQL EHOLUWHQ VÕQÕU %RXQGDU\GH÷HULH÷HULoHULNWHYDUVDVWULQJRODUDNDOÕQÕUYH 20-21 September /Eylül 2013 | Ankara / TURKEY 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE EXQGDQ VRQUDNL YH VÕQÕU GH÷HUOHUL DUDVÕQGD NDODQ DODQ PHVDMÕQPHWQLQLQYHULOGL÷LDODQGÕUùHNLO¶GD0\QHWH-posta sunucusuna gönderilen Gmail e-SRVWDLoHUL÷LLoLQ|UQHNVÕQÕU GH÷HUOHULJ|UOPHNWHGLU NXOODQÕODUDNJHUoHNOHúWLULOPLúWLU 9HULWDEDQÕQGD EXOXQDQ *HOHQ*LGHQ H-posta bilgilerinin WXWXOGX÷X WDEORODU úLIUHOHPH LúOHPL LoLQ NXOODQÕODQ DQDKWDUODUÕQ WXWXOGX÷X $QDKWDU%LOJLVL WDEORVX YH H-posta göndermeDOPD LúOHPOHULQGH NXOODQÕODQ VXQXFX D\DUODUÕQÕQ WXWXOGX÷X $\DUODU WDEORVX HQ EDVLW úHNLOGH ùHNLO ¶GH J|UOPHNWHGLU ùHNLO*PDLOH-SRVWDLoHUL÷LLoLQ|UQHNVÕQÕUGH÷HUOHUL 8\JXODPDGD 6073 VXQXFXVX RODUDN *PDLO¶LQ e-posta VXQXFXVXNXOODQÕOPÕúWÕU B. Ücretsiz E-3RVWD6HUYLV6D÷OD\ÕFÕøVWHPFL$\DUODUÕ E-SRVWD LúOHPOHUL LoLQ NXOODQÕOPDNWD RODQ *PDLO <DKRR 0\QHW +RWPDLO JLEL FUHWVL] e-SRVWD VHUYLV VD÷OD\ÕFÕODUÕQÕQ ELU NÕVPÕ 6073 VXQXFXODUÕQD HULúLPL HQJHOOHUNHQ ELU NÕVPÕ GD323VXQXFXVXQDHULúLPLHQJHOOHPLúGXUXPGDGÕU8\JXQ VXQXFXODUÕQ EXOXQPDVÕ LoLQ 7(/1(7 LOH ED÷ODQWÕ \DSÕODUDN JHUHNOLWHVWOHULQ\DSÕOPDVÕ|QHPOLGLU 7DEOR¶GH*PDLO0\QHW Yahoo ve Hotmail gibi e-posta KL]PHW VD÷OD\ÕFÕODUÕQÕQ 323 YH 6073 SURWRNROOHUL LoLQ \DSÕODQGÕUPD D\DUODUÕ \HU DOPDNWDGÕU <DKRR H-posta servisinde POP3 sXQXFXODUÕQD HULúLPL FUHWOL H-posta KHVDSODUÕQDVD÷ODPDNWDLNHQGL÷HUH-SRVWDVHUYLVVD÷OD\ÕFÕODU FUHWVL]RODUDNKHULNLSURWRNROGHKL]PHWHVXQPDNWDGÕUODU $QFDN VHUYLV VD÷OD\ÕFÕODUÕQ 323 VXQXFXODUÕQdan e-posta verilerini alabilmek LoLQ ZHE VD\IDODUÕ zerindeki e-posta \DSÕODQGÕUPDD\DUODUÕQGDQH-SRVWDKHVDSODUÕQDHULúLPL]QLQLQ verilmesi gerekmektedir. ùHNLO(-SRVWDNRQWUROX\JXODPDVÕYHULWDEDQÕúHPDVÕ 323 VXQXFXVXQGDQ oHNLOHQ H-postalarla ilgili bilgiler JHUHNOLG]HQOHPHOHUGHQJHoLULOLSSDUoDODQGÕNWDQVRQUDJHOHQ SRVWDWDEORVXQDND\GHGLOPLúWLU Giden e-SRVWD WDEORVXQGD X\JXODPDGDQ J|QGHULOHQ SRVWDODUÕQ ELOJLOHUL DQDKWDU ELOJLVL WDEORVXQGD úLIUHOHPH DOJRULWPDVÕQGD NXOODQÕODFDN DQDKWDU YH DQDKWDUÕQ ND\GHGLOGL÷LWDULKELOJLVLD\DUODUWDEORVXQGDSRVWDJ|QGHUPH YH DOPD LúOHPOHUL LoLQ NXOODQÕODQ VXQXFXODUÕQ ELOJLOHUL YH VXQXFXODUGD \HWNLOL RODFDN NXOODQÕFÕQÕQ KHVDS ELOJLOHUL YH tarih bilgisi \HUDOPDNWDGÕU Temel E-3RVWDøúOHPOHULQLQ*HUoHNOHúWLULOPHVL Yeni e-SRVWD J|QGHUPHN LoLQ ùHNLO ¶GHNL DQD PHQGH ³<HQL H-SRVWD´ VHoHQH÷L VHoLOHUHN H-SRVWDQÕQ LVWH÷H J|UH úLIUHOHQPHGHQ YH\D úLIUHOHQHUHN J|QGHULOHELOPHVL VD÷ODQPDNWDGÕU ùLIUHOHQPLú RODQ H-SRVWDODUÕQ VRQXQD X\JXODPD\D |]J ELU LIDGH RODQ ³-----LFU\SW´ LIDGHVL eklenmektedir. Uygulama gelen e-SRVWDQÕQ úLIUHOL YH\D úLIUHOHQPHGHQ TABLO I JHOPLúROPDGXUXPODUÕQÕúLIUHOHQPLúRODQPHVDMODUÕQVRQXQGD Ü&5(76ø=E-POSTA S(59ø6øS$ö/$<,&,/$5,PROTOKOL YAPILANDIRMA “-----LFU\SW´ LIDGHVLQLQ EXOXQXS EXOXQPDGÕ÷ÕQÕ NRQWURO Bø/*ø/(5ø POP3 SMTPHGHUHN \DSPDNWDGÕU %|\OHFH H-SRVWDQÕQ X\JXODPD Gelen E-Posta Giden E-Posta Portu Portu LoHULVLQGHNL DOJRULWPD\OD úLIUHOHQLS úLIUHOHQPHGL÷L WHVW Sunucusu(POP3) Sunucusu(SMTP) HGLOPHNWHGLU (÷HU H-SRVWD úLIUHOHQHUHN J|QGHULOPLúVH HGmail pop.gmail.com 995 smtp.gmail.com 587 SRVWD DODQÕQÕQ DOWÕQGDNL ³úLIUH o|]´ EXWRQXQD WÕNODQGÕ÷ÕQGD Mynet pop.mynet.com 110 pop.mynet.com 587 DúD÷ÕGDNL E|OPH\H úLIUHOHQPLú PHVDMÕQ úLIUHVL o|]OPú, RUMLQDOKDOL\NOHQPHNWHGLU Yahoo <DOQÕ]FDhFUHWOL +HVDSODUD$oÕN Hotmail pop3.live.com 995 smtp.mail.yahoo.com 587 smtp.live.com 587 IV. G(/øù7ø5ø/(1E-POSTA UYGULAMALARI A. E-postD.RQWURO8\JXODPDVÕ E-SRVWD NRQWURO X\JXODPDVÕ 1(7 SODWIRUPX ]HULQGH C# SURJUDPODPD GLOL LOH JHOLúWLULOPLú ROXS H-posta YHULOHULQLQ WXWXODFD÷Õ YHULWDEDQÕ LoLQ 06 $FFHVV NXOODQÕOPÕúWÕU Uygulamada temel e-SRVWD J|QGHUPH YH DOPD LúOHPOHUL öncekL E|OPGH EDKVHGLOPLú RODQ 7HOQHW NRPXWODUÕ 20-21 September /Eylül 2013 | Ankara / TURKEY ùHNLO(-3RVWDNRQWUROX\JXODPDVÕJHOHQ e-posta kutusu 335 Proceedings/Bildiriler Kitabı 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, .RQILJUDV\RQøúOHPOHUL 8\JXODPD LoHULVLQGHNL D\DUODU SHQFHUHVLQGHQ H-posta VXQXFXVX D\DUODUÕ \DSÕOPDNWDGÕU %X D\DUODU, POP3 VXQXFXVXQD ED÷ODQPDN LoLQ JHUHNOL RODQ JHOHQ SRVWD VXQXFXVX SRUW QXPDUDVÕ YH 6073 VXQXFXVXQD ED÷ODQPDN LoLQJHUHNOLRODQJLGHQSRVWDVXQXFXVXSRUWQXPDUDVÕYHKHU LNLVXQXFXLoLQGHNXOODQÕFÕKHVDEÕELOJLOHULQLNDSVDPDNWDGÕU ùHNLO¶GD |UQHNNRQILJUDV\RQELOJLOHULVXQXOPDNWDGÕU ùHNLO062XWORRNHNOHQWLVLúLIUHOLH-SRVWDJ|QGHUPHHNUDQÕ ùHNLO¶GHLVHJHOHQúLIUHOLH-SRVWDQÕQJHOLúWLULOHQRXWORRN HNOHQWLVLLOHo|]OPHVLLúOHPLJ|VWHULOPHNWHGLU ùHNLO (-3RVWD NRQWURO X\JXODPDVÕ H-posta sunucu, hesap ve anahtar D\DUODUÕ AnDKWDU$\DUODUÕ $QDKWDU GD÷ÕWÕP VRUXQX LOHWLúLPGH EXOXQDQ LNL WDUDIÕQ RUWDNELUúLIUHOHPHDQDKWDUÕ]HULQGHDQODúPDODUÕVRUXQXGXU ùLIUHOHPHDQDKWDUÕLOHúLIUH\Lo|]PHDQDKWDUÕQÕQD\QÕROGX÷X NODVLN úLIUHOHPH DOJRULWPDODUÕ NXOODQDQ VLVWHPOHUGH DQDKWDU GD÷ÕWÕP VRUXQX \D |QFHGHQ HOGHQ HOH DQDKWDUÕ YHUHUHN \D |]HO YH JYHQOL ELU NDQDO YDVÕWDVÕ\OD \D GD JYHQOL DQDKWDU GD÷ÕWÕPVXQXFXODUÕNXOODQDUDNo|]OPHNWHGLU [8]. <DSÕODQoDOÕúPDGDDQDKWDUSD\ODúÕPÕQÕQ|]HOYHJYHQLOLU ELUNDQDOYDVÕWDVÕ\ODYH\DJYHQOLDQDKWDUGD÷ÕWÕPVXQXFXODUÕ NXOODQÕODUDN JHUoHNOHúWLULOGL÷L YDUVD\ÕOPÕúWÕU ùLIUHOHPH DOJRULWPDVÕQGD NXOODQÕOPÕú RODQ YH KHP J|QGHULFL KHP GH DOÕFÕQÕQ ELOPHVL JHUHNHQ úLIUHOHPH DQDKWDUÕ ùHNLO ¶GDNL DQDKWDUD\DUODUÕED÷ODQWÕVÕQGDQVLVWHPHND\GHGLOPHNWHGLU B. MS Outlook E-3RVWDùLIUHOHPH(NOHQWL8\JXODPDVÕ %X oDOÕúPD NDSVDPÕQGD JHOLúWLULOHQ LNLQFL X\JXODPD 06 2XWORRN SURJUDPÕQD HNOHQWL RODUDN DGG-in) .NET 2008 SODWIRUPX]HULQGHC# SURJUDPODPDGLOLLOHJHOLúWLULOPLúWLU Eklenti X\JXODPDODUÕ SURJUDPODUÕQ \HWHQHNOHULQL DUWÕUPDN LoLQ JHOLúWLULOHQ YH SURJUDPODUD HQWHJUH HGLOHELOHQ NoN SURJUDPFÕNODUGÕU>17]. *HOLúWLULOHQHNOHQWLX\JXODPDVÕLOHúLIUHOLH-SRVWDJ|QGHUPH YH DOPD LúOHPOHUL EDúDUÕOÕ ELU úHNLOGH JHUoHNOHúWLULOPLúWLU ùHNLO ¶GD úLIUHOL H-SRVWD J|QGHULPLQH LOLúNLQ 06 2XWORRN SURJUDPÕQÕQHNUDQJ|UQWVVXQXOPDNWDGÕU Proceedings/Bildiriler Kitabı 336 ùHNLO062XWORRNHNOHQWLVLJHOHQNXWXVXúLIUHo|]PHHNUDQÕ V. GELECEKTE YAPILACAK Ç$/,ù0$/$5 *HUoHNOHúWLULOHFHN VRQUDNL oDOÕúPDODUGD H-posta kontrol X\JXODPDVÕ YH 06 2XWORRN H-SRVWD úLIUHOHPH HNOHQWL X\JXODPDVÕQGD H-SRVWD LoHULNOHULQGH \HU DODQ IDUNOÕ WUOHUGHNL GRV\D HNOHULQLQ KÕ]OÕ YH HWNLQ úLIUHOHQPHVL LoLQ WDVDUODQDQ DOJRULWPDQÕQ JHOLúWLULOPHVL SODQODQPDNWDGÕU $OJRULWPD úLIUHOHPHGH X\JXODQDQ EORN ED]ÕQGD \HU GH÷LúWLUPH ELW ED]ÕQGD G|QGUPH YH DQDKWDU GH÷HUL LOH úLIUHOHPH IRQNVL\RQXQGDQ JHoLUPH LúOHPOHUL LOH úLIUH NÕUPD VDOGÕUÕODUÕQDNDUúÕGLUHQoOLROPDVÕQDUD÷PHQWPDQDKWDUODUÕQ GHQHQGL÷L NDED NXYYHW EUXWH IRUFH VDOGÕUÕODUÕQGD JHUHNOL KHVDSODPDJFDQDKWDUÕQX]XQOX÷XLOHGR÷UXRUDQWÕOÕRODUDN DUWDFD÷ÕQGDQ úLIUHQLQ NÕUÕOPD\D NDUúÕ JoOHQGLULOPHVL LoLQ VRQUDNL oDOÕúPDODUGD DQDKWDU ER\XWX DUWWÕUÕODUDN úLIUHOHPH YHELWRODUDNJHUoHNOHúWLULOHFHNWLU $\UÕFD oDOÕúPDGD WDVDUODQDQ úLIUHOHPH DOJRULWPDVÕ DVLPHWULN úLIUHOHPH DOJRULWPDODUÕ LOH JoOHQGLULOHUHN KLEULG ELU úLIUHOHPH DOJRULWPDVÕ JHOLúWLULOPHVL SODQODQPDNWDGÕU *HOLúWLULOHFHN KLEULG DOJRULWPD LOH DQDKWDU SD\ODúÕPÕQGD NXOODQÕODQ DoÕN DQDKWDU DOW\DSÕODUÕ oDOÕúPDGD \HU DODQ uygulamalara entegre edilebilecektir. 20-21 September /Eylül 2013 | Ankara / TURKEY 6. ULUSLARARASI %é/*é*µ9(1/éçéYH.5é372/2-é .21)(5$16, 6th INTERNATIONAL INFORMATION SECURITY & CRYPTOLOGY CONFERENCE VI. S218d9(KAZANIMLAR %XoDOÕúPD\ODKHUJHoHQJQGDKDGD\D\JÕQODúPDNWa olan e-SRVWD NXOODQÕPÕQÕQ GDKD JYHQLOLU ROPDVÕ VD÷ODQPÕúWÕU dDOÕúPDGD ELOLQHQ \D\JÕQ NXOODQÕODQ úLIUHOHPH DOJRULWPDODUÕ GÕúÕQGD \HQL ELU DOJRULWPD JHOLúWLULOPLúWLU DES, AES ve %ORZILVK JLEL VLPHWULN úLIUHOHPH DOJRULWPDODUÕ \D\JÕQ NXOODQÕODQ YH ELOLQHQ DOJRULWPDODU ROPDVÕ VHEHEL\OH internet RUWDPÕQGD EX DOJRULWPDODUÕQ NÕUÕOPDODUÕQD \|QHOLN oHúLWOL DUDoODU YH oDOÕúPDODU EXOXQPDNWDGÕU %X oDOÕúPDGD JHOLúWLULOHQ úLIUHOHPH DOJRULWPDVÕQÕQ |]JQ ROPDVÕ, en D]ÕQGDQ SURJUDPODPD ELOJLVL ROPDGDQ KD]ÕU DUDoODUÕ kullanarak zaman zaman úLIUHNÕUPDNRQXVXQGD EDúDUÕOÕRODQ N|WQL\HWOLNLúLOHULQKHGHILROPDNWDQNXUWDUPDNWDGÕU 8\JXODPD úLIUHOHPH |]HOOL÷L VD\HVLQGH JYHQOLN NRQXVXQGDJHWLUHFH÷LDYDQWDMODUDHNRODUDNFUHWVL]H-posta VHUYLV VD÷OD\ÕFÕODUÕQÕQ L]LQ YHUGL÷L |OoGH VXQXFXODUD HULúPHNWH YH \DSÕODQ NRQILJUDV\RQODUD J|UH LVWHQLOHQ KHVDEÕQ WP H-SRVWDODUÕQÕ X\JXODPD NHQGL YHULWDEDQÕQD \NOH\HELOPHNWHGLU *PDLO <DKRR +RWPDLO JLEL FUHWVL] H-posta servis VD÷OD\ÕFÕODUÕQ NXOODQÕP V|]OHúPHVLQGH EHOLUWWL÷L ]HUH; NXOODQÕFÕ H-SRVWDODUÕ EX VHUYLV VD÷OD\ÕFÕODU WDUDIÕQGDQ LVWHQLOGL÷LQGH VLOLQHELOPHNWH YH\D oQF NLúLOHUOH SD\ODúÕODELOPHNWHGLU%XoDOÕúPDVD\HVLQGHH-postalar servis VD÷OD\ÕFÕODU WDUDIÕQGDQ VLOLQPH GXUXPXQD NDUúÕQ NRUXPD DOWÕQD DOÕQPÕú ROPDNWDGÕU $\UÕFD H-SRVWDODU LVWHQLOGL÷LQGH úLIUHOHQHUHN J|QGHUPH LúOHPLQH WDEL WXWXOGX÷X LoLQ ELOJLOHU oQF NLúLOHULQ HOLQH JHoVH GDKL J|QGHULOHQ H-SRVWD LoHUL÷L DQODúÕOPDPDNWDGÕU REFERANSLAR [13] [14] [15] [16] [17] International Journal of Emerging Technology and Advanced Engineering, Vol. 1, pp. 6-12, 2011. ViNLSHGL³*L]OL$QDKWDUOÕùLIUHOHPH´ http://tr.wikipedia.org/wiki/Gizli_anahtarl%C4%B1_%C5%9Fifrele me(ULúLP5.2013). R. Sureswaran YH DUN ³$FWLYH (-mail system protocols monitoring DOJRULWKP´ TENCON 2009 - 2009 IEEE Region 10 Conference, 2010. Vikipedi, http://tr.wikipedia.org/wiki/SMTP(ULúLP12.06.2013. PURJUDPODPD7Y ³7HOQHW iOH 3RS 6XQXFX\D %D÷ODQPD YH 0DLO øúOHPOHUL´ http://www.programlamatv.com/ders/bilisim/telnet-ilepop3-sunucuya-baglanma-ve-mail-islemleri/, (ULúLP.2012). J. Boyce, B. Sheresh ve D. Sheresh, ³0LFURVRIW 2IILFe OXWORRN 2007´ O'Reilly Media, Inc., 2009. Muhammet Serkan Çinar, \ÕOÕQGD 'RNX] (\OO hQLYHUVLWHVL %LOJLVD\DU 0KHQGLVOL÷L E|OPQGHQ \NVHN OLVDQV GHUHFHVL DOPÕúWÕU ùX DQGD Hacettepe hQLversitesi Bilgisayar 0KHQGLVOL÷L E|OPQGH GRNWRUD |÷UHQFLsidir. ,379WDEDQOÕX]DNWDQH÷LWLP \D]ÕOÕPPKHQGLVOL÷L ELOLúLP JYHQOL÷L YH VHPDQWLN ZHE DODQODUÕQGD oDOÕúPDODU \DSPDNWDGÕU ,úÕO Çinar, Gazi hQLYHUVLWHVL Bilgisayar 0KHQGLVOL÷L E|OPQGH \NVHN OLVDQV \DSPDNWDGÕU %LOLúLP JYHQOL÷L YHUL PDGHQFLOL÷L, LQVDQ ELOJLVD\DU HWNLOHúLPL DODQODUÕQD LOJL GX\PDNWDGÕU +DVDQ ùDNLU %LOJH \ÕOÕQGD <ÕOGÕ] 7HNQLN hQLYHUVLWHVL %LOJLVD\DU 0KHQGLVOL÷L E|OPQGHQ PH]XQ ROGX\ÕOÕQGD.ÕUÕNNDOHhQLYHUVLWHVL(OHNWULN-Elektronik 0KHQGLVOL÷L $QDELOLP 'DOÕ QGD \NVHN OLVDQVÕQÕ \ÕOÕQGD %DúNHQW hQLYHUVLWHVL (OHNWULN-Elektronik 0KHQGLVOL÷L $QDELOLP 'DOÕ QGD GRNWRUDVÕQÕ WDPDPODGÕ *D]L hQLYHUVLWHVL %LOJLVD\DU 0KHQGLVOL÷L E|OPQGH 2003 \ÕOÕQGD \DUGÕPFÕ GRoHQW XQYDQÕQÕ YH \ÕOÕQGD GRoHQW XQYDQÕQÕDOGÕ [1] D. Choukse, U.K. Singh, L. Laddhani ve R. Shahapurkar, “Designing secure email infrastructure´ Wireless and Optical Communications Networks (WOCN), 1964, pp. 1–9, 2012. [2] ù %D\]DQ ³(-3RVWD *YHQOL÷L 1HGHQ gQHPOLGLU"´ http://www.guvenliweb.org.tr/guvenlik/node/40 (ULúLP 08.07.2013). [3] $005DR³Policy Specification and Enforcement for Detection of Security Violations in a Mail Service ´ 9th International Conference on Information Technology , pp. 172– 175, 2006. [4] A. Ghafoor, S. Muftic ve G. 6FKP|O]HU,´ CryptoNET: Design and implementation of the Secure Email System´ 2009 Proceedings of the 1st International Workshop on Security and Communication Networks (IWSCN), pp. 1–6, 2009. [5] S.J. Stolfo, S. Hershkop, Ke Wang ve O. Nimeskern,´ EMT/MET: systems for modeling and detecting errant email´ DARPA Information Survivability Conference and Exposition, vol. 2, pp. 290–295, 2003. [6] 0 7DNHVXH ³(-mail Sender Identification through Trusted Local Deposit-$JHQWV´IEEE Conf, 2011 14th International Conference on Network-Based Information Systems (NBiS), pp. 84–91, 2011. [7] G.Bahadur, Chan ve W.Weber ³3ULYDF\ 'HIHQGHG 3URWHFWLQJ <RXUVHOI2QOLQH´Que, Chapter 8, 2002. [8] A. Levi ve M.U. Caglayan, "(OHNWURQLN 3RVWD *YHQOL÷L YH $oÕN $QDKWDU6XQXFXODUÕ", %LOLúLP7%'%LOLúLP.XUXOWD\Õ, pp. 114117, 1997. [9] D. Zissis, ve D. Lekkas, "Addressing cloud computing security issues", Future Generation Computer Systems, pp.583-592, 2012. [10] TropSoft,"DES Overview", http://www.tropsoft.com/strongenc/des.htm(ULúLP [11] A. Nadeem, "A Performance Comparison of Data Encryption Algorithms", IEEE, 2005. [12] J. Thakur, ve K. Nagesh, "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis.", 20-21 September /Eylül 2013 | Ankara / TURKEY 337 Proceedings/Bildiriler Kitabı
Benzer belgeler
PDF ( 2 )
LoHUPHGHQ JHQ DOW NPHOHULQL YHULQLQ \DSÕVÕQD
EDNDUDNVHoPHNWHGLU:UDSSHUWHNQL÷LQGHLVHPDNLQH
|÷UHQPHVL DOJRULWPDODUÕ NXOODQÕOPDNWDGÕU >@
3HUIRUPDQVÕ DUWWÕUPDN YH HQ L\L YHUL...
DNS Güçlendirme Saldırısı RisN Analizi
7/¶ye ve \DSÕODQ LúOHP PLNWDUÕQÕQ GD PLO\RQX EXOPDVÕ
beklenmektedir [2]. 'Q\DQÕQ GL÷HU ONHOHULQGH GH ,78
(International Telecommunication Union) verilerinHJ|UH
PLO\DU NLúLQL...
TELEFON HATTI ÜZERİNDEN PIC - KULIS
NRGODUÕ DVP ELU 3&¶GHQ VHUL SRUW DUDFÕOÕ÷Õ LOH YHULFL WDUDIWDNL PLNURGHQHWOH\LFL\H
J|QGHULOPHNWHGLU %X PLNURGHQHWOH\LFL LOJLOL DOÕFÕ WDUDIÕ DUD\ÕS PDNLQH NRGODUÕQD LOLúNLQ
...
PowerFocus CMS
HQFRGHUOHULX]DNWDQD\DUODPD\ÕGHVWHNOHU
dRNOXPRQLW|U,3NDPHUD\DNDGDUJ|VWHULU
%LWRUDQÕJ|VWHUJHVLKHUJ|UQW\D\ÕQÕLoLQD÷NXOODQÕPÕ
RUDQÕQÕJ|VWHULU%|\OHFHEDQGJHQLúOL÷LNXOODQÕP...
Toplu Taşımada En Az Aktarma Kriterine Göre Seyahat Planlama
VLVWHPYEDUDoODUNXOODQÕODUDNKÕ]OÕELUúHNLOGHoRN
ID]ODVD\ÕGD\ROFX\XWDúÕPDNEXQRNWDODUDUDVÕQGDNL
NDUD\ROXWUDIL÷LQLFLGGLRUDQGDUDKDWODWPDNWDGÕU%X
|QHPOLQRNWDODULOHúHKULQGL÷HUN...
Siber Saldırı Hedefleri ve TürNiye`de Siber GüvenliN Stratejisi
\|QHWPHN LoLQ NRQWURO PHUNH]LQL NXOODQPDN SHQHWUDV\RQ
WHVWOHULQL \DSPDN JoO NLPOLN GR÷UXODPD DOJRULWPDODUÕQÕQ
NXOODQÕOPDVÕQÕ VD÷ODPDN YH ORJ WDNLSOHULQLQ \DSÕOPDVÕQD
|QHP YHU...
AES BloN Şifresinin Anahtar Genişletme Rutininin Geliştirilmesi ve
%X oDOÕúPDGD $(6 EORN úLIUHVLQGH NXOODQÕODQ DQDKWDU
JHQLúOHWPH UXWLQL LQFHOHPLú YH EX UXWLQGHNL SUREOHPOHU
LUGHOHQPLúWLU $(6 EORN úLIUHVLQLQ DQDKWDU JHQLúOHWPH
UXWLQLQGHNL ]DDI...
GenetiN Algoritma ve TeNil Değer Ayrışımı Tabanlı Yeni Bir Kırılgan
ùLIUHOHPHLúOHPLQHJHOHQNDUDNWHUOLNGL]LLONRODUDN\HU
GH÷LúWLUPHLúOHPLQHWDELWXWXOXUøONNDUDNWHUYHVRQ
NDUDNWHU\HUGH÷LúWLULU