E-mail encryption is the process of converting plain text (e-mail) into cipher text. Only the person for whom the information is intended can read it.
In advance of this encryption, the email certificate of the communication partners must be exchanged. This is done digitally with an e-mail. As soon as the certificates of both parties are known to the e-mail programme, both parties can send important or secret data in encrypted form. This means that only the sender and the recipient are then able to read this information.
Encryption is important for people who often work with sensitive data or information. This transmission of data is secure and cannot be seen from the outside. Attackers and hackers are thus denied access.
Encryption converts a readable text - i.e. a plaintext - into an unreadable ciphertext. The data is transformed into a seemingly arbitrary string of characters that can only be read by a cryptographic key. The cryptographic key is a set of mathematical values that both sender and receiver send digitally. With this key, the receiver converts the data back into a readable format. The mathematical formulas behind it are of such great key length that solving the formulas to the origin would take a very long time.
For hackers, this data thus remains unreadable. The time it would take an attacker to decrypt this data would be endless. By the time a code could be cracked, the information sent would no longer be there or would be unusable.
Symmetric encryption, also known as secret key encryption, uses a single key to encrypt and decrypt data. You must share this key with the recipient. For example, you want to encrypt a document. This document is then given a password, which you then have to actively pass on to the other party so that they can also read the document. So there is a password that is shared with several parties.
Asymmetric encryption requires two keys to work. First, a public key must be published to encrypt the data. Second, a private key is used to decrypt the data. Of course, you can do all this manually, but it is easier to use ready-made e-mail certificates - so-called S-MIME certificates - for this purpose.
Another important tool among asymmetric encryption is the digital signature. The digital signature is a cryptosystem in which a sender uses a secret signature key to calculate a value for a digital message. The digital signature is thus like a kind of thumbprint of a person and gives an email programme the certainty that incoming emails with a digital signature are secure and do not contain viruses.
The digital signature is like a kind of precursor to S/MIME encryption.
S/MIME stands for Secure Multipurpose Internet Mail Extensions. It is the worldwide established standard for the encryption of e-mails - based on a hybrid cryptosystem. The use of S/MIME requires corresponding certificates (the private and the public key) with which the contents of an e-mail can be reliably encrypted by the sender and then decrypted again exclusively by the authorised recipient. You do not need special software to send encrypted information. S/MIME is an operating system independent standard and therefore also works with Windows or Mac. Please contact us! We will gladly install all certificates for you and provide active service. For example, the continuous updating of these certificates!
We distribute S-MIME certificates and are happy to set them up for you. We also constantly maintain them and provide you with further services. Digital signatures are also a component of encrypted communication and our expertise.
Please contact us! We will be happy to set up secure communication for you! Don't give any attackers from outside a chance to access information or data records.