How does Trustera work?

Trustera’s unique encryption architecture is designed to be easy to use, secure, and based on industry standards.

Because Trustera manages your encryption keys for you, you gain all the benefits of military grade asymmetric encryption, but don’t have the bothersome task of managing a key library or keeping it up to date – Trustera does this all for you in the cloud.

Steps in Encrypting an Email

This explanation assumes that neither you nor the recipients have not yet entered their passphrase before sending or receiving the email, and that neither your or any recipients have communicated in the past.

Step 1

When you decide to encrypt and sign an email, the Trustera email client asks for your passphrase, checks that your locally stored and encrypted private key is up to date, and then downloads the public keys for all the intended recipients from the Trustera cloud servers. It then encrypts the body and any attachments of the email.

Step 2

The encrypted email is sent to your email provider (Gmail, Hotmail, Exchange, etc.) for delivery. While the email resides on your email provider’s servers it remains encrypted waiting to be sent to or retrieved by the intended recipients.

Step 3

When a recipient receives the encrypted message in their Trustera email client, the application asks for their passphrase, decrypts their local private key and downloads your public key from the Trustera cloud and decrypts the message and any attachments.

If you receive the encrypted email within another email client, the email will have the associated TSD file attached. As long as you have the Trustera email client installed on the device or system, you can simply open the attachment (by selecting it, or double-clicking it) and the content will be passed to the Trustera email client for decryption.