LOG IN TRY OUT!REGISTER
NEWSWHAT IS THIS ABOUT?HOW DOES THIS WORK?GMAILTERMS OF USECONTACT

ENCRYPTION

How does this whole proccess works?
[step by step, with screenshots]

Application uses public-private key (RSA) encryption. Public key is used to encrypt and private key to decrypt a message.

1. First time you use application, you create public-private key par with your secret phrase.encrypt_scrshot.jpg

2. You keep you private key for yourself.

3. You give your public key to the world (example, publich it on your website) or anyone you want to be able to send you encrypted messages.

4. Sender uses your public key to encrypt an email message and sends it to you.encr_email_scrshot.jpg

5. You use your private key to decrypt an email message sent by the sender.decr_email_scrshot.jpg

Fun fact:

Anybody can see encrypted email and your public key. The owner of the private key (you) is the onlyone who can decrypt messages encrypted by the public key.

SIGNING

How does this whole proccess works?
[step by step, with screenshots]

Application uses public-private key (RSA) encryption for signing email messages. Private key is used to sign and public key to check message signature.

1. First time you use application, you create public-private key par with your secret phrase.encrypt_scrshot.jpg

2. You keep you private key for yourself.

3. You give your public key to the world (example, publich it on your website) or anyone you want to send signed messages.

4. You use your private key to digitally sign an email message and send it to receiver.sign_email_scrshot.jpg

5. Receiver uses your public key to verify your signature and confirm that you are the author of the message and that the message was not altered in any way.signchk_email_scrshot.jpg


IMPORTANT!
At this point, application does not encrypt (or sign) file attachments, only email message.