Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

2.2 Sending signed and encrypted email

This section is part of the amber and green pathways.

Below is an optional activity.

Activity 1 Optional activities

Timing: Allow about 10 minutes

As an alternative to exchanging encrypted emails with a colleague or friends, if you have set up Mailvelope or another PGP email client you can send an encrypted email to an automated mail box at The Open University:

  • First send an email that simply says ‘public key’ to: cybersecurity-mooc@open.ac.uk [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)]
  • The server will send back an automatic reply that includes the current PGP public key for this mail box.
  • Again follow the instructions on the Mailvelope website, or for the PGP encryption software that you are using, use this public key to create a new email with a message ‘testing encrypted content’

    Note that you need all the characters including -----BEGIN PGP PUBLIC KEY BLOCK----- and -----END PGP PUBLIC KEY BLOCK-----

  • Send your email to: cybersecurity-mooc@open.ac.uk. You will receive an email back from us to say that we’ve successfully decrypted your message! If you don’t receive an email within 2 hours, please try again.

To find out more about Mailvelope’s features or get help with specific problems visit Mailvelope help.

End-to-end encryption as a service

It can be a problem for organisations and individuals to set up the software for encrypted emails on all the devices that they use.

End-to-end encryption can be provided as a service. At the time of writing, ProtonMail and Tutanota both have a good reputation and also offer a free service.

Follow the instructions at https://protonmail.com/ or https://tutanota.com/ to set up two FREE accounts with the same service in two separate browsers. Then use these accounts to send a message from one account to the other.

In the last few sections you have explored what is involved in using cryptography to encrypt and sign email communications.

  • What seemed to be the hardest parts of the process?
  • What would you want to improve to make it easier?
  • How does the use of ProtonMail or Tutonota compare with the use of Mailvelope or other secure email software?

You may find it useful to compare your experience with the instructions for one of the other tools mentioned in Section 2, Putting cryptography to use.

Please complete Quick poll #16 now.

Open the poll in a new window or tab then come back here when you’re done.

CYBER_B2

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to university level study, find out more about the types of qualifications we offer, including our entry level Access courses and Certificates.

Not ready for University study then browse over 900 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus