In today’s post we will learn how to encrypt, decrypt and sign e-mails. You can read this article to learn how to do it or you can watch our instructional video that we made for you!
When you are operating with e-mails in your everyday life, you’re most likely to use these three security features cryptography keys are used for:
Keep reading to see how it’s done or click here to see our instructional video.
You won’t need Cryptoucan™ for this action as we are using other users’ public keys that we’ve already imported to our Kleopatra key manager.
And with that, the e-mail is securely sent!
Picture 1: Choosing public key
You will need your Cryptoucan™ now as we are using our private key – that’s only known to us and that’s stored on our device – to pair it with the public key that was used to send the e-mail in the first place.
Once the PIN code is successfully entered, the content of the e-mail is revealed.
Picture 2: Decrypting e-mail
When you are signing e-mails, you are signing them with your private signature key. This way no one can fake your identity if they don’t have your private key. You will need Cryptoucan™ for this operation.
Once you enter it, the e-mail is sent. You can see the signature of e-mails at the top of the e-mail – with the color corresponding to its trustworthiness.
Picture 3: Signature of the e-mail
Video 1: Cryptoucan™ usage: Handling e-mails
That’s all for this week, thank you very much for reading and see you next time!