Encryption of emails. Best Free Email Encryption Software

Our solution will allow you to not only encrypt your emails for free, but also do it using desktop, web and smartphone clients.

To encrypt mail using the PGP method using a PC client, you will need Gpg4win, Kleopatra (part of the Gpg4win package) and Thunderbird programs. Before encryption can run, you will need a key pair. To do this, open the Kleopatra program installed with Gpg4win. Then start creating keys using the keyboard shortcut “Ctrl+N”, select “Create a personal OpenPGP key pair” and follow the instructions on the screen.

Once the keys have been created, open Thunderbird (and change your email address if necessary). Then, through the add-on manager, add the Enigmail add-on to Thunderbird. After Thunderbird reboots, you will be greeted by the Enigmail Setup Wizard. In it you will need to select standard configurations, and then mark the existing key.

Before sending an encrypted letter, you need to import the file with the recipient's public key (which is sent, for example, by email) into the Kleopatra program using the “Ctrl+I” combination. In the future, Thunderbird automatically encrypts emails addressed to this recipient.

Using PGP in a browser

To access encrypted emails through an inbox interface at work, for example, you'll need the Mailvelope browser add-on (available for Firefox and Chrome). It can be installed from the official website. The Mailvelope add-on is already configured by default for all the most commonly used email services.
For Mailvelope encryption to work, you need to export your private key and your contacts' public keys from Kleopatra and import them into Mailvelope. In Kleopatra you will find your private key in the “My Certificates” tab. Right-click on it and select “Export Secret Keys”. Activate the “ASCII armor” option and save the key file.


Mailvelope works with all popular email services, including Gmail: messages there are encrypted in a separate editor

To import the key into Mailvelope, click on the Mailvelope icon in the upper right corner of the browser, and then on “Settings”. In the section “Key Management | Import keys" select the file with the key. Depending on the email service, Mailvelope is built into the interface of the email service in slightly different ways: either as a button in the “New Message” window (for Gmail), or as a separate “Write and Encrypt” option for some other email services. If Mailvelope doesn't have default settings for your email service, you'll need to log into it, then click on the Mailvelope icon and select "Add new site."

Encrypting emails on Android devices

With the free OpenKeycain and K-9 Mail apps, which you can download from the Google Play Market, PGP encryption can also be used on Android smartphones (there is a paid iPGMail app for iPhone and iPad). Install both applications, first launch K-9 Mail and configure a connection to your mailbox there.
Then copy your key files to your smartphone (for example, via a USB connection) and launch OpenKeycain. On the main screen, select “Import key from file”, find the file copied to your smartphone and mark the desired keys.

To ensure that K-9 Mail has access to keys stored in OpenKeycain, in incoming messages, hold your finger on the created account to open the pop-up menu and go to “Mail Settings | Cryptography". Click on the "OpenPGP Provider" entry and select OpenKeycain. When writing letters using the K-9 Mail application, you can now sign and encrypt outgoing messages.

October 28, 2013 at 4:41 pm

How to encrypt messages via e-mail and will this make it “safer”

  • Information Security
Is information sent via email secure?
The honest answer to this question would be: “Yes. But no". When you visit most websites, HTTP is displayed in the address bar. This is an insecure connection. If you log into the account of one of the major email services, you will already see HTTPS. This indicates the use of SSL and TLS encryption protocols, which ensure the secure “journey” of a letter from the browser window to the mail server. However, this does not give anything in connection with, which comes into force on July 1, 2014. Moreover, absolutely nothing protects your correspondence from an unscrupulous employee of a postal service company, hacker attacks, an unclosed session on someone else’s computer, an unprotected Wi-Fi point, as well as any requirement of the special services - already now - and even the postal service itself, in accordance with their own privacy policy.


All letters arriving, leaving or stored on the mail service server are at the complete disposal of the company to which it (the server) belongs. By ensuring security during the transfer itself, the company can do whatever it wants with messages, since, in essence, it receives the letters at its disposal. Therefore, you can only hope for the integrity of its (company) management and employees, and also for the fact that you are unlikely to seriously interest anyone.

When using corporate mail, correspondence is protected by the IT service, which can install a very strict Firewall. And, nevertheless, this also will not save you if an unscrupulous employee “leaks” the information. We are not necessarily talking about a system administrator - an attacker only needs to be “inside” the corporate network: if he is serious, the rest is a matter of technique.
Let's encrypt
Encrypting the text of the letter and attachments can somewhat increase the level of foolproof protection of your mail (they can also be placed in an archive with a password, for example, if the text itself does not contain confidential data, but the archive does). In this case, you can use special software.

The body of the letter itself can be encrypted with a third-party cryptographic program, let me repeat this a little in my own way. The most popular service for which an encryption program was specially created is Gmail. The SecureGmail extension is installed in Google Chrome, which supports this encryption, after which everything is quite simple - enter a password for the encrypted message and a hint question to recover it. The only drawback is that it is limited to GoogleChrome only.

There is an encoder that is suitable for almost any online mail, for example, mail.ru, yandex.ru, Gmail.com - for all mail services that you can open in a Mozilla browser window. This is an extension of Encrypted Communication. The principle of operation is the same as SecureGmail: after writing a message, select it with the mouse, then right-click and select “encrypt using Encrypted Communication.” Next, enter and confirm a password known to you and the recipient. Naturally, both of these clients must be installed on both the recipient and the sender, and both of these people must know the password. (It's worth noting that it would be reckless to send the password via the same email.)

In addition to plugins for the browser in which you open mail, there is an application for desktop clients that can also be used with online mail services - PGP (Pretty Good Privacy). The method is good because it uses two encryption keys - public and private. You can also use a number of programs both to encrypt data and to encrypt the text of a letter: DriveCrypt, Gpg4win, Gpg4usb, Comodo SecureEmail and others.

Sadly, advanced encryption technology, no matter how easy to use and beautiful it may be, will not help if, for example, a backdoor is installed on your computer, which takes screenshots and sends them to the network. Therefore, the best way to encrypt is not to write letters. The motto “We must meet more often” takes on a new meaning in this context.
We minimize risks
As noted above, the ideal method of encryption is not to write letters. Most often, you should not use free email services for work-related correspondence, especially if you signed a non-disclosure agreement. The fact is that if your messages are intercepted from corporate email, the company’s IT department will deal with the security gap. Otherwise, you are personally responsible. Remember: when using “external” mail, correspondence will definitely reach third parties, at least employees of the company providing the postal service. And they did not sign a non-disclosure agreement with your employer.
If you are an important person in a company, do not send key documents through open channels, or do not use e-mail to transmit them at all, but for work, use corporate mail and do not send important letters to addresses of free mail services.

In all other cases, for example, when concluding contracts, it is useful to use mail, since the electronic message contains the facts of your work agreements and can help you in the future. Remember that most information leaks are not due to the fault of hackers, but to the “human factor.” It may be enough for you to use complex passwords, change them regularly and prevent them from being lost. You should not forget to close your sessions on other people’s computers, do not use unsecured connections when working via Wi-Fi in public places, check the boxes in the mailbox settings “remember my IP address”, “track IP addresses from which sessions were opened”, “do not allow parallel sessions." And also do not create simple questions and answers to recover your password and do not lose your mobile phone if your account is linked to it.

On this day, the Russian Cryptographic Service celebrates its professional holiday.

"Cryptography" from ancient Greek means "secret writing".

How did you hide words before?

A peculiar method of transmitting a secret letter existed during the reign of the dynasty of Egyptian pharaohs:

they chose a slave. They shaved his head bald and painted the message on it with waterproof vegetable paint. When the hair grew back, it was sent to the recipient.

Cipher- this is some kind of text conversion system with a secret (key) to ensure the secrecy of transmitted information.

AiF.ru has made a selection of interesting facts from the history of encryption.

All secret writings have systems

1. Acrostic- a meaningful text (word, phrase or sentence), made up of the initial letters of each line of the poem.

Here, for example, is a riddle poem with the answer in the first letters:

D I am known loosely by my name;
R The rogue and the innocent swear by him,
U I am more than a technician in disasters,
AND Life is sweeter with me and in the best lot.
B I can serve the harmony of pure souls alone,
A between villains - I was not created.
Yuri Neledinsky-Meletsky
Sergei Yesenin, Anna Akhmatova, Valentin Zagoryansky often used acrostics.

2. Litorrhea- a type of encrypted writing used in ancient Russian handwritten literature. It can be simple and wise. A simple one is called gibberish writing, it consists of the following: placing the consonant letters in two rows in the order:

they use upper letters in writing instead of lower ones and vice versa, and the vowels remain unchanged; for example, tokepot = kitten and so on.

Wise litorrhea involves more complex substitution rules.

3. "ROT1"- a code for kids?

You may have used it as a child too. The key to the cipher is very simple: each letter of the alphabet is replaced by the next letter.

A is replaced by B, B is replaced by C, and so on. "ROT1" literally means "rotate forward 1 letter in the alphabet." Phrase "I love borscht" will turn into a secret phrase “Ah myvmya”. This cipher is intended to be fun and easy to understand and decipher even if the key is used in reverse.

4. From rearranging terms...

During World War I, confidential messages were sent using so-called permutation fonts. In them, letters are rearranged using some given rules or keys.

For example, words can be written backwards, so that the phrase “Mom washed the frame” turns into a phrase "amam alym umar". Another permutation key is to rearrange each pair of letters so that the previous message becomes “am am y al ar um”.

It may seem that complex permutation rules can make these ciphers very difficult. However, many encrypted messages can be decrypted using anagrams or modern computer algorithms.

5. Caesar's sliding cipher

It consists of 33 different ciphers, one for each letter of the alphabet (the number of ciphers varies depending on the alphabet of the language used). The person had to know which Julius Caesar cipher to use in order to decipher the message. For example, if the cipher E is used, then A becomes E, B becomes F, C becomes Z, and so on alphabetically. If the Y cipher is used, then A becomes Y, B becomes Z, B becomes A, and so on. This algorithm is the basis for many more complex ciphers, but by itself does not provide reliable protection for the secrecy of messages, since checking 33 different cipher keys will take a relatively short time.

Nobody could. Try it

Encrypted public messages tease us with their intrigue. Some of them still remain unsolved. Here they are:

Kryptos. A sculpture created by artist Jim Sanborn that is located in front of the Central Intelligence Agency headquarters in Langley, Virginia. The sculpture contains four encryptions; the code of the fourth has not yet been cracked. In 2010, it was revealed that characters 64-69 NYPVTT in Part 4 meant the word BERLIN.

Now that you have read the article, you will probably be able to solve three simple ciphers.

Leave your options in the comments to this article. The answer will appear at 13:00 on May 13, 2014.

Answer:

1) Saucer

2) The baby elephant is tired of everything

3) Good weather

Department of Human and Animal Physiology

Pigaleva Maria, group 173B

Google Search

Keywords:

ENCRYPTION OF EMAILS

http://ru. wikipedia. org/wiki/Email

Electronic mail (English email, e-mail, from English electronic mail) - technology and the services it provides for sending and receiving electronic messages (called “letters” or “e-mails”) over a distributed (including global) computer network .

The main difference (and advantage of e-mail) from other message transmission systems (for example, instant messaging services) was previously the possibility of delayed message delivery, as well as a developed (and confusing, due to the long development time) system of interaction between independent mail servers (failure one server did not lead to the inoperability of the entire system).

Currently, any novice user can create their own free email account; just register on one of the Internet portals (see services).

http://www. /security/03_01_26_Java_Crypto/Java_Crypto. html

Mail encryption

Two standards are currently widely used for email encryption: S/MIME (using a public key infrastructure) and Open PGP (using certificates with a trust scheme grouped around the user).

Previously, there were also MOSS and PEM standards, but due to incompatibility with each other and inconvenience of use, they did not take root.

The S/MIME and Open PGP standards provide three types of security: tamper protection, irrevocable signature, and confidentiality (encryption). Additionally, S/MIME version 3 allows the use of secure acknowledgment (in which a receipt of receipt of a letter can be generated successfully only if the letter reaches the recipient unchanged).

Both standards use symmetric cryptographic algorithms to encrypt the body of the message, and the symmetric key is encrypted using the recipient's public key. If a letter is addressed to a group of people, then the symmetric key is encrypted in turn by each of the recipients' public keys (and sometimes, for convenience, by the sender's public key so that he can read the letter sent to him).

Cryptographic security methods in programming languages

Viktor Rudometov

Main problems and ways to solve them

With the transition from the era of industrial civilization to a predominantly informational one, the role of accumulated and appropriately processed knowledge increases noticeably. The emergence and rapid development of computer networks has provided efficient methods of data transfer and quick access to information for both individuals and large organizations. However, local and global computer networks, as well as other methods of transmitting information, can pose a threat to data security, especially in the absence of adequate measures to protect them from unauthorized access.

Thus, now, as the information society develops, security measures are becoming one of the main tools. They provide confidentiality, secrecy, trust, authorization, electronic payments, corporate security and countless other important attributes of modern life.

In this regard, the presence of built-in information security mechanisms and the efficiency of their operation in application systems is increasingly becoming decisive when consumers choose the optimal solution. Therefore, software developers have been paying attention to these issues for a long time. Cryptographic methods can provide the proper level of protection.

Mathematical cryptography arose as the science of encryption - the science of cryptosystems. In the classic model of a secret communication system, there are two participants who need to transfer secret (confidential) information not intended for third parties. This task of ensuring confidentiality, protecting secret information from an external enemy, is one of the first tasks of cryptography.

There are several approaches to solving this problem.

Firstly, you can try to create a communication channel that is absolutely reliable and inaccessible to others. Unfortunately, this is extremely difficult to achieve, at least at the current level of modern development of science and technology, which provide methods and means not only for transmitting information, but also for unauthorized access to it.

The second approach is to use public communication channels and hide the very fact of transmitting any information. The science of stenography deals with this area. Unfortunately, shorthand methods cannot guarantee a high level of confidentiality of information.

The third way is to use a public communication channel, but transmit the data in a transformed form, so that only the recipient can restore it. Cryptography deals with the development of methods for converting information that ensures its encryption.

Over time, the scope of cryptography has expanded and gone far beyond its original purpose. To illustrate this point, consider the following example. Let's say a bank client intends to transfer money from his account to the account of some organization. It should be noted here that not all information transmitted is confidential. Indeed, you only need to send bank details that are generally known and publicly available. However, it is important for the bank to make sure that it is the owner who wants to transfer the money, and not the attacker. The client is interested in ensuring that the amount is not changed, and that no one can send money on his behalf or change information about the recipient of the money.

It is worth noting that the cryptosystem works according to a certain methodology (procedure).

This methodology involves the use of:

· one or more encryption algorithms, which can be expressed in the form of mathematical formulas;

· keys used by these encryption algorithms,

key management systems,

unencrypted text

· ciphertext (ciphertext).

An example of an encryption methodology using keys is shown in Fig. 1.

Rice. 1. An example of an encryption scheme.

Classification of cryptographic algorithms

There are two key methodologies: symmetric, which uses a private key, and asymmetric, which uses a public key. Each methodology uses its own procedures, key distribution methods, key types, and encryption and decryption algorithms.

In the symmetric secret key methodology, a single key is used to perform both encryption and decryption using the same symmetric encryption algorithm. This key is shared between the two parties in a secure manner before the encrypted data is transmitted. The problem is that it is difficult to distribute private keys securely. The advantages of this system include relatively high speed when encrypting and decrypting transmitted messages.

An example of the ongoing use of symmetric methodology is the ATM network. These systems are original developments of the banks that own them and are not for sale.

The asymmetric public key methodology uses two interrelated keys. One of the keys is kept secret, and the other is published in open sources. Data encrypted with one key can only be decrypted with another key. One of the most important disadvantages is the need to use very large keys to ensure security, which undoubtedly affects the speed of encryption algorithms.

Often both methodologies are combined. For example, a symmetric (secret) key is generated and transmitted using asymmetric methodology algorithms.

Common symmetric methodology algorithms include DES (Data Encryption Standard), 3-DES, RC2, RC4 and RC5. An example of asymmetric is RSA and ECC. And a separate position is occupied by one of the most popular digital signature algorithms, DSA (Digital Signature Algorithm).

The relevance of the problem of maintaining the integrity or confidentiality of information has been obvious at all times. But it became especially acute with the development of information technology, in particular, the global Internet. This network provides a convenient, fast way to communicate. The use of special means ensures the necessary levels of confidentiality. At the same time, in modern life, a computer user often has to encounter such complex algorithms as RSA or DSA. As a result, almost no one is surprised by the possibility of using a digital signature or even encrypting E-mail messages (Fig. 2).

Asymmetric cryptography in Perl

The fairly popular Internet-oriented language Perl also has built-in security features.

For example, consider the use of the RSA cryptographic encryption algorithm.

RSA algorithm

The problem that RSA solves is the transmission of secret information in such a way that only the recipient can read it.

The essence of the method is as follows.

The potential recipient of the encrypted message performs the following actions:

· two large prime numbers are generated (for example, 1024 bits, 308 characters) - p And q;

· their product is calculated n = pq;

A random number is selected e, which is coprime with the number (p‑1)(q‑1), and also does not exceed it;

· the value is calculated d such that ed = 1 mod (p‑1)(q‑1).

· pair (n, e) becomes the public key ( public key), A d- private key ( private key).

The public key is published in open sources, for example, sent via email.

For the encrypted message to work, the sender must perform the following steps:

· get the public key;

· create a message in numerical form m, not exceeding n;

· With and there is an encrypted message that is sent to the creator of the public key.

The recipient of the encrypted message calculates m = (cd) mod n and receives the message in decrypted form.

The strength of the RSA algorithm is ensured by the fact that the attacker needs to obtain the number d, which can be calculated by factoring the number n. However, at the moment there are no fast algorithms that solve the problem of factorization of large numbers.

Basic methods of working with RSA

In Perl, all cryptography is delivered through CPAN modules. The RSA implementation is in the Crypt::RSA package.

Generation of 2048-bit keys:

$rsa = new Crypt::RSA;

$public, $private) = $rsa->keygen(Size => 2048)

The public key is published.

Data encryption (string $message) using a public key:

my $c = $rsa->encrypt(Message => $message, Key => $public);

The result is an encrypted message $c, which is sent back to the recipient. The recipient uses the previously generated private key for decryption $private,:

$message = $rsa->decrypt(Ciphertext => $c, Key => $private);

In addition to the presented lines of source text in Perl, it is worth noting some additional features of the package.

To send secure messages, information must be presented in the form of one or more numbers, the values ​​of which do not exceed n. In this case, each message corresponds to a certain number and vice versa. Perl language tools allow you to split a message into a sequence of such numbers, and also later connect them back into text.

Unfortunately, the RSA system has one important feature that reduces the level of security. If an attacker can force the sender to encode a message already known to him, then the values p And q can be calculated without factorization n. However, this can be successfully combated by overloading the original message with “garbage” (padding). Over time, the PKCS #1 standard was developed for this operation. Crypt::RSA implements not only PKCS #1, but also the more modern OAEP, which uses padding by default. When using PKCS #1, you must pass the appropriate parameter to the constructor.

$rsa = new Crypt::RSA (ES => "PKCS1v15)

http://*****/article/a-72.html

If you are concerned about the confidentiality of your correspondence, then the next part of the article is especially for you.

To ensure the security of transmitted data, many encryption algorithms have been invented. Each of them is good in its own way. There are two ways to ensure the security of correspondence:
1. Use an encrypted communication channel with the mail server.
2. Encrypt the message itself.

Establishing an encrypted connection seems to be the simplest solution - just check the appropriate box in the client settings:
Tools - Account Settings...

Server settings - Use secure connection:

In this case, the further fate of our letter will be in the hands of the mail server: it may turn out that it does not support a secure connection. In addition, there is also a recipient server. Therefore, it is better to encrypt the message itself.

PGP encryption is traditionally used to encrypt mail. PGP (Pretty Good Privacy) is an application cryptosystem. This cryptosystem was developed specifically to protect email from outsiders. It is an asymmetric encryption algorithm. The essence of the action is this: each user has two keys - public and secret. You give the public key (send it by mail, post it on the website) to the person with whom you will correspond. This key does not represent a secret - it is needed so that your interlocutor can encrypt the letter that he wants to send to you. Once the message is encrypted, only the owner of the secret key can decrypt it. That is you. In the same way, you get your friend's public key in order to encrypt messages sent to him.
The idea of ​​asymmetric encryption is not new, but in the context of mail encryption it was introduced in 1991. Subsequently, the public liked the idea so much that a corresponding open standard, OpenPGP, was developed. The emergence of the standard has led to the fact that many implementations of PGP encryption are fully compatible with each other, regardless of whether a given implementation is commercial or free and publicly available.

In order to use PGP in Thunderbird, we need a program that will generate keys and also encrypt and decrypt messages. The GNU Privacy Guard (GnuPG or GPG) program is perfect for this. You can download it directly from the project website:

http://www. gnupg. org/

And here the paths of Windows and Linux diverge. When considering Linux, it is worth mentioning that GnuPG is present in many distributions by default. If your distribution does not have GnuPG, then you can download the installation package from the project’s FTP server:

ftp://ftp. gnupg. org

Alternatively, you can use a package manager:

Synaptic Package Manager is traditionally used to manage packages. Enter “gnupg” in the search bar, mark the package to install and click “Apply”.

In the case of Windows, download the distribution from the same FTP server:

ftp://ftp. gnupg. org/

Size - about 2.1 MB.

The installer is the most common:

In the next window you can see the classic license that accompanies all free open source programs:

The installation procedure is trivial - click “Next” until the program is installed. The same program is used to provide encryption not only in Thunderbird, but also in other email clients, for example, The Bat.

This is where the difference between operating systems ends and you can once again enjoy true cross-platform functionality.
The next step is to install the add-on to work with the newly installed GnuPG. The add-on is called "Enigmail". You can download it at:

http://enigmail. mozdev. org/download/index. php

The addition represents. xpi file. The size is about a megabyte. After that, select the “Add-ons” line from the “Tools” menu:

And then install the add-on itself by clicking the “Install” button and selecting the add-on file:

If everything is done correctly, the “OpenPGP” item will appear in the main menu bar. Find "Settings" there:

And indicate the path where GnuPG is installed. If you followed the sequence of actions described above, the system itself will determine the location of the program:

The preliminary preparations are now complete. You can proceed to creating keys. Go to "OpenPGP" - "Key Management":

And we begin the mystery of generating our first pair of keys:

Select the settings as shown in the screenshot:

Here the password is not the password you use to access your mail, but simply a phrase that will be used during decryption. It is not necessary to indicate it. However, if someone else has access to your computer, then you can specify it.
In the "Advanced" menu, select the key length and encryption algorithm:

Click "Create Key". During generation, you can and even should not only look at the progress indicator, but also move the mouse and type something on the keyboard. Various random number generators are used to generate the key, and they depend on what is happening at the moment. Thus, the more actions are performed on the computer at the time of generation, the more random our key will be and the more difficult it will be to crack. This can be compared to the fact that it is easier to guess the password "" than "eR4_a#y0", despite the fact that the first one is longer.

Key generation ends with a message that everything went well:

You can immediately create a key revocation certificate. This is useful for letting everyone know that your private key has been lost, expired, or stolen.

After this, your key will appear in the key management window:

Now you need to send it to everyone with whom you are going to secretly correspond. We create a new letter and attach the public key to it:

In response, they send us their public key, which we import into the database:

After importing the key, go back to key management and set the trust level for the key:

That's all. You can safely transmit the most secret information:

If your letter is intercepted, then the attacker will have to spend many (in the case of 204in something that can be read. But the one to whom you are writing will not feel any difficulties: with an 8-bit key - A LOT) years in order to turn this:

Trade secrets" href="/text/category/kommercheskaya_tajna/" rel="bookmark">trade secrets, then you will know how this is done and will be fully armed to meet the threat of interception of important information by competitors.

Email encryption is an extremely necessary thing that users rarely think about. They begin to think about and take measures to protect email only after they are attacked. Today I will tell you how to encrypt email and prevent the interception of important, confidential data.

1. Email service provider with PFS

Use the services of providers that already use the new Perfect forward secrecy (PFS) system to exchange keys between the sender and recipient.

In Russia, PFS is already offered by such services as: Web.de, GMX and Posteo.

2. Setting up Gpg4win

Install the installation package. Typically, the package is used from a Windows administrator account.


If you don't want to take the risk, you can still mitigate vulnerabilities by using a restricted user account for encrypted communications to deny access to account profile data.

3. Create encryption

Open the Kleopatra certificate manager, which is installed on your computer along with Gpg4win, and click File | New Certificate... to launch the key generation wizard. Select here Generate a personal OpenPGP key pair and enter your name and email.


How to encrypt mail

By clicking Next, enter a code word that is easy to remember for you, containing uppercase and lowercase letters and numbers. Skip the last dialog box, click on the finish button, and your key pair is ready to use.

4. Setting up Thunderbird and Enigmail

Download and install for your email. If you use the services of large providers or Posteo, then for the installation wizard it will be enough to enter the email address and password that you have to log in through the service’s web client. When setting up the Enigmail add-on in Thunderbird, press Alt to display the menu and click on the tab Tools | Add-ons. In the search bar, type Enigmail and press Enter. The first entry should be the latest version of Enigmail. Click the Install button.


Encrypted mail

After installing and restarting Thunderbird, you will be greeted by the Enigmail wizard. In the settings of this wizard, select Convenient automatic encryption, Don't sign messages by default... And Change parameters: Yes. In the Select Key dialog box, click on your key that you created in step 3. Now your emails will be encrypted.

5. Encryption of emails and attachments

You can continue to send and receive unencrypted emails using Thunderbird or from your provider's web client. If you want to send an encrypted message, obtain its public key from the future recipient, save it to your hard drive and import it into the Kleopatra utility by opening it and selecting “Import Certificates”. To encrypt a letter, first write it and attach the necessary attachments. Then in the Write letter window, click on the Enigmail menu, where the current encryption and signature status of the letter will be displayed in the first two entries.


Encrypted mail

By clicking the arrow icon next to it, you can force emails to be sent encrypted or unencrypted. You must add a signature to encrypted emails so that the recipient can verify that you actually sent the email.

6. Receiving encrypted emails

To send you a cryptographically secure email, you need to use Enigmail (or another OEP-PGP-compatible solution, such as Claws Mail) and your public key, which you should send in an unencrypted email to the future sender. Click in mail on Enigmail | Attach my public key. When receiving an encrypted email, Enigmail will require you to enter a password.


That's all. With the help of the steps described above you will be able to reliably. If you liked the article, click on your social media buttons. networks and subscribe to site news on social networks.