Encrypted Email Exchange - User Guide
Requires Microsoft .NET 4.0 and higher
This user guide will help you understand the different functions that the software provides. This software was created for consumers to keep their data and communications secure via email or any other means of communication across unencrypted lines. Sending data across the internet [HTTP] is a perfect example of a non-secure line.
If you have any questions feel free to contact us at:
Like previous Triple Phelix Software applications, you work with a top to bottom approach. This means that you start at the top of the program and finish at the bottom within seconds once you understand how to use the program effectively. However, unlike previous Triple Phelix Software applications, this software was developed to require two or more users to communicate over the internet. Sending emails is a very popular way to communicate and is also a very non-secure way to communicate across the internet. When you send an email that data is normally sent non-securely and saved on a server. The emails are also sitting on a server in plain text which means that anyone can read your emails if your account were to be hacked or if the company that hosts your emails were to be hacked. So let’s go step by step so that you can understand how to use this software.
1.) The very first thing you and the other recipient across the web should do is “Generate Keys” to start your secure session.
2.) This is one of the two optional functions in Encrypt Everything Exchange to send your Public Key. Choosing this option allows you to “Save your Public Key” then send it as an email attachment. If you ever decide to start a new conversation or “Generate Keys” again, you must make sure that you send the other recipient your new “Public Key”.
3.) If someone you know sends you a Public Key file you will load the file by clicking “Load Public Key” and selecting the file.
4.) This is the second of the two optional functions in Encrypt Everything Everywhere to send your Public Key. When you click the “Copy” button this allows you to paste the Public Key information (ctrl+v) within an email and send your Public Key that way. Once again if you ever decide to start a new conversation or “Generate Keys” again, you must make sure that your send the other recipient your new “Public Key”.
5.) You will use the “Paste” function to paste a Public Key that was sent to you.
Before continuing I would like to make a few things very clear to prevent confusion. You must Generate Keys first and foremost. After that it’s up to you and the other recipient to decide on how you want to exchange public keys. I have given users two ways to send [Options 2 & 4] a Public Key and two ways to load or paste [Options 3 & 5] a Public Key that was sent to them. You can choose any path that you want to exchange keys. Once you have exchanged and loaded public keys with another recipient and they have done the same, you can begin to send encrypted data. You should always load the other recipient’s Public Key and NEVER load your own Public Key. If you load your own public key the encryption process will not work as expected and the other recipient will not be able to unencrypt or read the data you send. Just remember to generate and exchange Public Keys.
Now I will continue with the step by step guide:
6.) Before you send any data you will need to encrypt the data so that no one can read the data when you send it. So here you will “Select a File” that needs to be encrypted. On the other hand if you have received some data and you want to decrypt that data you’ll select that file here instead.
7.) Here you will select a “Save Location” for the file. You can save the file anywhere you want and name the file anything you want. If you intend to Encrypt data then this will be where the encrypted data will be saved. If you intend to Decrypt and read data after receiving it then this will be where the decrypted data will be saved.
8.) Press this Button to “Encrypt” data. You’ll send this data to the other recipient.
9.) Press this Button to “Decrypt” data. You’ll read this data.
So I will like to explain steps 6 through 9 now to prevent confusion. Basically if you want to send a text message in an app such as notepad and you don’t want anyone to read the contents in the message, you will write the message and save the file. After the private message has been saved you will select that file in Step 6. From that point you will select a location to save the encrypted data in Step 7. Since you want to encrypt the data you will simply press the “Encrypt” which is Step 8. You will find the data encrypted in an unreadable file in the location you selected in Step 7. From that point you will send the encrypted data to the other recipient. No one will be able to read the data except the other recipient.
Now let’s say you have received data that has already been encrypted. Now you will select the encrypted file that was sent to you in Step 6 – “Select a File”. After loading the encrypted data in step 6 you will need to select a location to save the file which is Step 7. Now you will simply press the “Decrypt” button to decrypt the file. The file will be readable from the location you selected in Step 7.
I will give you an example of two people exchanging sensitive data. Alice and Bob are popular fictional characters to use in this example like this so I will use them. So Alice and Bob want to communicate securely over the internet. This is how they would successfully keep their conversation or data private:
1.) Alice generates all of her Keys by pressing ‘Generate Keys’.
2.) Alice sends her Public Key to Bob.
3.) Alice loads Bob Public Key.
4.) Alice selects a file named “Secret.txt” file. This file contains a private message.
5.) Alice selects a location to save an encrypted version of the file. She names the file “encrypted_secret”.
6.) Alice pressed the “Encypt“ button and the file is saved as “encrypted_secret.txt”
7.) Alice sends the encrypted file to Bob.
1.) Bob receives the encrypted file named “encrypted_secret.txt” from Alice.
2.) Bob selects the file that was sent to him.
3.) Bob then selects a location to save the file. He decides to name the file “decrypted_secret”
4.) Bob pressed the “Decrypt” Button and the file is saved as “decrypted_secret.txt”
5.) Bob can now read the private message that Alice has sent him.
Now this is how it works if Bob sends a file to Alice:
1.) Bob generates all of his Keys by pressing ‘Generate Keys’.
2.) Bob sends his Public Key to Alice.
3.) Bob loads Alice Public Key.
4.) Bob selects a file named “Secret.txt” file.
5.) Bob selects a location to save an encrypted version of the file. He names the file “encrypted_secret”.
6.) Bob pressed the “Encypt“ button and the file is saved as “encrypted_secret.txt”
7.) Bob sends the encrypted file to Alice.
1.) Alice receives the encrypted file named “encrypted_secret.txt” from Bob.
2.) Alice selects the file that was sent to her.
3.) Alice then selects a location to save the file. She decides to name the file “decrypted_secret”
4.) Alice pressed the “Decrypt” Button and the file is saved as “decrypted_secret.txt”
5.) Alice can now read the sensitive data that Alice has sent him.
The only data that should be sent non-securely is the public key. The public key is public for a reason. I have programmed this software to purposely keep the private key from ever leaving your computer so you don’t have to worry about making that mistake. Even though I created this program to be used for sending information via email, you aren’t limited to just emails. You can encrypt and send ANY data that you would like to share across the internet. More experienced users will take this route. This means that you can send music, pictures, videos, text files or any type of data that you choose privately. You also will never have to worry about hackers or “man in the middle” attacks because if the data has been tampered with, the software will automatically reject the file.
If you have any questions feel free to contact us at: