End-to-End Encryption: Email & Android

Instructor: David Gloag

David has over 40 years of industry experience in software development and information technology and a bachelor of computer science

Email and cell phones make up a big part of most people's lives, and as such require security. In this lesson, we'll take a look at end-to-end encryption, and how it applies to email and Android devices.

The Time We Spend on Communication

We spend a great deal of time communicating. We talk to our families at various points throughout the day, and in particular, with our significant others. We talk to our friends on the phone, about a wide variety of topics. And we send email to various parties as we move through the tasks of our typical work-day. With this in mind, would you expect these topics, at times, to cover information that is of a sensitive nature? Without a doubt! You've probably contemplated this yourself at some point. So the question becomes, what do you do about it? You could simply avoid sensitive topics, or you could employ technologies like end-to-end encryption.

What is Encryption?

Encryption is a transformation process. It changes the form of information, and hides it from those with malicious intent. It uses a key (some external data), and a sequence of mathematically-based steps to perform this transformation. This combination introduces a random aspect to the process that augments its strength, or its ability to resist attacks. It is also reversible, meaning that the original information can be obtained from the transformed. It contributes a fundamental part of many business and personal activities including ecommerce transactions, email delivery, and phone calls. It does its work silently, behind the scenes.

What is End-to-End Encryption?

End-to-end encryption is not a specific form or type. Rather, it is a group of encryption techniques used to transmit information from one place to another. The techniques that fall into this category have a common characteristic: only the sender/receiver pair can read the information. This means it is not decrypted at any point during transmission (unlike other forms like Link encryption). This reduces the amount of exposure the unprotected information receives, and increases its resistance to attacks. It is commonly used in situations like important political emails, military communications, and secured cell phone traffic.

How Does End-to-End Encryption Apply to Email?

Email lends itself perfectly to end-to-end encryption. In fact, the process of sending and receiving email was probably one of the reasons end-to-end encryption was created in the first place. Most of us are familiar with the email send/receive process. But just to review, with encryption in the mix, here are the steps:

  • An email is composed in our favorite email program (Outlook, Firefox, Google Mail, etc).
  • You click 'send', and the message goes into the send queue.
  • When its turn arrives, your message is encrypted and sent through the Internet to its destination.
  • The message is received by the destination.
  • The receiver clicks the message for viewing.
  • The message is decrypted and displayed.

It is important to note that the encrypt/decrypt process is pretty much transparent to the user. Normally, it requires only two things. First, you have to enable the encryption. This is usually an option in your email program. And second, you have to enter your key. There are various methods for doing that depending on your client.

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it now
Create an account to start this course today
Used by over 30 million students worldwide
Create an account