Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

7 effective steps for creating public and private keys for encrypting and decrypting email messages; end to end encryption

How to create public and private keys for encrypting and decrypting messages

In the previous week, I made a video that takes you through the steps of encrypting and decrypting email and now i just want to note down the steps right here. You should be able to watch the video through the link below

Asymmetric encryption, also called public key cryptography, uses public key private key pairing to encrypt and decrypt messages. For the person you are sending the email to be able to decrypt your messages, they must have Mailvelope as an extension and must have created a public and private key

Learn about email encryption from Cloudflare

Microsoft’s definition of email encryption

Let’s look at the steps for creating public and private keys for encrypting and decrypting email

Step 1: Hover your mouse over to the icon of extensions on your web browser, at the top right of your screen and click on the icon.

It should be able to display a new small window and a list of extensions in case you have many installed. Click on the mailvelope. If you don’t have mailvelope added to your web browser, please read through my previous article to add it. I am sharing the link right here https://circumventteching.com/2023/12/20/steps-for-setting-up-mailvelope-an-app-for-email-encryption/. Select dashboard

Step 2: Click on key management.

Click key management to set up a key for encrypting and decrypting email

Step 3: Click on the generate key. Fill in your details, the name of the key, the email, and the password for opening the key. Then scroll down and click on the button to generate the key

Generate a key on mailvelope for encrypting and decrypting email

Step 4: Mailvelope will send you an encrypted message, click on show message and decrypt it using the key that you have created. Enter the password you used for creating the key. The message will be decrypted.

Enter the password you set up to decrypt a message on mailvelope

After verifying your email address, you should be able to use the key that you have created to encrypt and decrypt messages. But then you have to create a key for the person you want to send an email to for you to send encrypted messages to them.

Learn more about different types of encryption

How to create an SSL Certificate

The history of encryption

Advantages of end-to-end encryption

  • Prevents unauthorized information access. End-to-end encryption disguises your information into code that can’t be understood thus making it very hard for attackers to alter the information or access private details
  • Promotes privacy. The disguise that encryption gives to the information promotes privacy especially after encrypting and decrypting email messages
  • It also promotes resistance to surveillance
  • End-to-end encryption also leverages user trust. Users always trust entities when they know their data is protected

More advantages of encryption as given by seald

Leave a Reply

Your email address will not be published. Required fields are marked *

Prevent adware attacks with these 5 useful tips

Adware has a high potential of harming your computer as well as destroying every information you hav…

How to recover a hacked Whatsapp Account; 2 ways

Hello, it has been a long time sharing with you something about digital security. During the time I …

10 reasons why your linkedin account was restricted

Are you wondering why your LinkedIn account was restricted? LinkedIn is a good platform for networki…

Can anyone hack google photos?: 5 answers

Google Photos is a feature of your Google account. The question ” Can anyone hack Google Photo…

6 secure browsing practices to adopt in 2025 for safer online experiences

Secure browsing practices are key to ensuring that internet users do not fall prey of cyber threats …

10 ways to know it is Vishing; a famous phishing scam nowadays

Vishing is the act of scammers using malicious calls to gather information or money from their victi…

6 Tips for preventing PayPal Scam

Preventing PayPal scam is crucial in this error where there is too much malicious activity being don…

1 2 3 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *