The International Journal of Innovative Research in Computer and Communication Engineering
Keeping data secured and in unreadable format while the mail has been delivered to someone else was a big issue in earlier days. With the introduction of encryption technology it was little bit secure but the hackers have also managed to extract important information even if it is being encrypted using the available technology. The public key generation depending on the attributes of the specified text to be encrypted, that will generate multiple keys to be used to encrypt or decrypt the data. Additional private key to be added is the server time stamping with the encryption key to ensure that the information shall not be retrieved after specific period of time.