"Email Encryption" Product Presentation Prepared by Taha Khan SP-10-MB-0236

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 10

“Email Encryption”

Product Presentation
Prepared by Taha Khan
SP-10-MB-0236
What is Encryption?

• It is referred to as the activity of converting


data or information into a code.
• In Cryptography, encryption is the process of
transforming information using an algorithm
called “Cipher” to make it unreadable to
anyone except those possessing special
knowledge, usually referred to as a “Key”.” It
can typically perform decryption also that is
to make the encrypted information readable
again by making it unencrypted.
Why is Email Security Important?

Email is a mission-critical application & Do you


know who else is looking at your Email ?
– Important data and information is transferred
via email.
– Email servers are poor data storage vehicles.
– In the online world, the threat of identity theft
and invasion of privacy has loomed larger.
– As data travels through the stations, each of it
can be used by the Hackers and Snoopers to
copy or record what otherwise would be
considered private
information.
Encrypted Emailing

By Relaying the transmission of the emails


onto the central mail server, the message
travels on secure channels of the SSL (secure
socket layer) v 1.0 protocol, which is latest
standard for ensuring transmission security.
The message is secured and encrypted using
Asymmetric key by encryption / decryption
methodologies using strong AES (advanced
encryption standard) algorithms. The
message cannot be decrypted until
the availability of a private key.
Structure of an Unencrypted email
Raw data
layer

Data
Structure of an Encrypted email
• Signed Applet connected to
the Repository

HTML & Offline • Manipulation of Private key


Applet Layer is performed over a secure
channel.
• Works even with web based
Encrypted email like Hotmail and
Email Yahoo
• Secure key distribution
• Key transmission over SSL
Extra
secure channel
PGP layer
Encryption Concept
Simple Encryption Architecture
Advanced
dCipherMAIL Encryption
Architecture Architecture
Advantages of Encryption

Prevent unauthorized
data usage

Authentication
Transparent to end
&
users
Integrity

User

Eliminates administrative Prevents Identity


burdens theft

Maximum data
protection

You might also like