HIGH DENSITY MAIL PROTOCOL – HDMP High Density Mail Protocol (HDMP) is a binary network protocol designed for the exchange of e-mail messages among computers or other devices. This protocol isn’t compatible with the current e-mail exchange standards SMTP (Standard Mail Transfer Protocol) and POP3 (Post Office Protocol 3), since HDMP features a completely different structure which makes it extremely efficient, fast and safe, eradicating the main causes for SPAM, phishing (ID forgery) and ill-intentioned email. Sending User Sending Server Intermediate Servers Receiving Server Receiving User Outstanding Features High Speed to Send and Receive E-mails - Data Compression: Depending on its content, this feature may reduce email size up to 10 times, which facilitates a measurable speed increase and minimizes information traffic across the net. This compression always takes place internally and automatically through the method “Normal Deflate 08” (currently used in applications like WinZip). By contrast, the current e-mail protocol (SMTP) requires that all binary data in the email be converted into text format and encodes them using “Base64”, which results in a 30% size increase! - Low Hand-Shaking: HDMP requires very few steps to achieve client-server communication and send or receive e-mails. Only 4 steps are necessary to deliver an e-mail, in contrast to the 14 steps required by the current SMTP standard. This speeds e-mail sending and reception. - Unique Communication Port: Only one communication port is used to send and receive e-mails. Thus both processes take place in only one connection session, without having to connect and authenticate separately for each task (as in SMTP/POP3 standards). - Binary Protocol: HDMP uses data transmission in binary format instead of using Text. At present, data transmission in Text format (as currently used in SMTP) is unnecessary, since the user doesn’t intervene in the communication by entering commands manually. The binary protocol accelerates the transmissions because a great amount of unnecessary data is eliminated. As an additional benefit, information theft is made more difficult. Information Protection - Data Encryption: Activating this feature protects the content (text of the message and attached file/s) through the use of encryption methods like AES, 3DES, etc. The AES cipher is currently used by the FBI for “Top Secret” level protection. The decryption can be External (provided by the receiving user) or PDS (see below). - Encryption and decryption code “PDS Security” (Persistent Digital Signature). This code (512-bit PDS Signature) enables not only the user ID verification, but also the protection of information through automatic encryption. To achieve the automation of all these processes, the contact list of the e-mail client application provides a special field that permits to store this particular code for each contact. User ID Protection - Protection of Recipients’ Addresses: When an e-mail has more than one recipient, they are all treated as BCC (Blind Carbon Copy). When sending the e-mail to each recipient, the sending server removes all other recipients’ addresses, so that each recipient can only know “how many other people the email was sent to” but not their e-mail addresses. This prevents address theft due to indiscriminate address forwarding, which commonly occurs in “e-mail chains”, for example. - Safe User Authentication: User authentication to send or receive e-mails is safely achieved by sending to the server a 64-byte MD5 code, instead of having to send user name, access code and the domain it belongs to; this prevents account theft and data interception by hackers. Protection against SPAM and Phishing - E-mail Trace Verification: When sending an e-mail via HDMP, this goes through a series of servers till it gets to its final recipient; each intermediate server doesn’t send the e-mail to the next server without verifying before that the e-mail really comes from the preceding server. This reverse connection takes place after the primary connection, which allows a complete verification of the trace. Finally, if it is not possible to fulfill this verification at any point of the e-mail trajectory, the e-mail is destroyed and doesn’t get to the receiving user. This prevents the sending of SPAM using software known as SPAM Pumps (software for massive SPAM forwarding). - Sender ID: When sending an email via HDMP, the sending server adds the information of the “sender’s e-mail” and “sender’s name”. This feature prevents the user sending an e-mail from changing any of their data and forging their identity; or if they did, they would leave a trace of their accessing the server where they registered their account. - PDS Identity (Persistent Digital Signature): The persistent digital signature allows the ID validation of a sending user. This is so because every e-mail has a field known as PDS Checksum which stores a 256-bit number created from certain data from the email and the user’s PDS identity. The recipient can verify this number (if they have the sender’s PDS Signature) and in this way verify the authenticity of the received e-mail. If it comes to it the e-mail client application can be configured to filter e-mails that don’t validate the sender’s ID using the PDS; this would completely block unknown or illintentioned users. - Nonexistent Open Mail Relay servers: Users who want to send an e-mail must use the server where they opened their e-mail account since they will have to validate their identity in it to send the e-mail. This feature prevents servers from being used by third parties to send SPAM without having an account in them. - Client IP Record: When sending an e-mail, the sending server takes the IP number of the sending user and attaches it to the e-mail. In this way the recipient can know the sending user’s ID, thus providing another way to know the e-mail’s origin and judge its validity. - All these features prevent phishing as well as the most common sources of SPAM, thus protecting the recipient. Data Transmission Reliability - Integrity Control through CRC-32: When sending or receiving e-mails via HDMP, controls of data validity are made using the cyclic redundancy check CRC-32. By contrast, the Simple Mail Transport Protocol (SMTP) doesn’t make any kind of integrity control. Other features - Multi-Body Capacity: E-mails can have more than one message body, a feature similar to the “sheets” in Excel documents. - Linked Attached Files: Attached files are always linked to a message body in particular; this allows separating the file belonging to each body and organizing more efficiently the information within the e-mail. - XML E-mail Header: It enables fields like user card inlay with photo, e-mail status, part sizes, digital signatures, etc. PERSISTENT DIGITAL SIGNATURE - PDS The PDS is a free digital signature that can be used for a user’s ID validation and automatic data encryption or decryption. This signature is a hexadecimal number of 64 characters in its complete version, or 44 characters in the “identity only” version. How it is Created The required data for the creation of a Persistent Digital Signature are the person’s full name, city of residence or birth, and a password (this password is only used to create the signature); these are combined in a certain way using algorithms like MD5, HMAC-SHA1 and CRC16 to generate the final number. Constitutive parts and nomenclatures PDS Signature: Complete signature of 64 hexadecimal characters. It has a Self Integrity Checksum. Example: 3ba58abdae32ad0fc19a1801e2d9b9d12651304dfa5a19a7cccfa21206c92b7a PDS Identity: It corresponds with the first 44 signature characters and enables a user’s identification. This portion can be used in isolation from the full PDS and has a self integrity checksum of the portion as well. Example: 3ba58abdae32ad0fc19a1801e2d9b9d12651304dfa5a PDS Security: it is found in the following 16 characters and functions as a public key for information encryption or decryption. This portion can’t be used in isolation from the full PDS. Example: 19a7cccfa21206c9 Use of PDS in the HDMP Standard The two main functions of the permanent digital signatures are implemented in the e-mail protocol HDMP. This means that the user that receives an email has the sender’s ID authentication through PDS Identity, and e-mail automatic decryption through PDS Security. It is worth noting that in no case the Persistent Digital Signature or any of its parts is directly attached to an e-mail or contact card, but it is simply used locally to create a code known as PDS Checksum that is calculated using several specific points of an e-mail and the digital signature itself. This prevents signature theft through e-mail interception. Created by David Jorge Aguirre Grazio December 2007 www.hidens.com.ar