Secure Email communication
Emails are like post cards. They are unprotected all the way from the sender to the recipient. Along the way everyone can read, stop or manipulate them. Unencrypted emails are not safe from attacks from the source of their origin to the storage on the recipient's hard drive.
Email encryption wraps the email message in a secure digital envelope. Only the sender and authorized recipient are supposed to have access. However, some traditional encryption solutions store the certificates on the same hard drive as the email correspondence. This is an easy prey for potential attackers.
With the CrypToken as a secure and independant storage device for certificates and passwords, the email and encryption key are never stored in the same hardware. This guarantees that the certificates and passwords are not accessible through the directory of the PC.
Encryption and digital signature with Public Key cryptography
Asymmetric Cryptography, also known as Public-Key Cryptography, generates tap-proof email encryption and ensures that the email is not manipulated and originates from the authorized sender. Public-Key Cryptography refers to a crytographic algorithm which requires two separate keys, one of which is private and one is public.
The private key is secret, while the public key is given by your computer to any computer that wants to communicate securely with it. An email sent from one computer to another won't be secure since the public key used for encryption is published and available to anyone. However, anyone who picks the email up cannot read it without the private key in the proper CrypToken attached.
All standard email providers like Microsoft Outlook or Mozilla Thunderbild support functions to encrypt and / or sign emails.
Copyright © 2002, 2023 ITSS UG (haftungsbeschränkt) - Last Update 26 May 2023