Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


is it possible to send encrypted email from corporate outlook mail to a gmail account

Posted on 2013-12-11
Medium Priority
Last Modified: 2014-11-12
To protect information sent by email from being intercepted, an email can be encrypted. We use encryption for email sent between email addresses in the company e.g. from Mike@ourcompany.com to Andrew@ourcompany.com.
But is it possible to encrypt email sent from Andrew@ourcompany.com to a gmail account (e.g. name@gmail.com)? And what does the gmail account need to have to be able to read the encrypted email?
Thank you
Question by:TechNovation
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2

Expert Comment

ID: 39710813
You may want to try Penango (https://www.penango.com/). Its a browser extension that allows use of encrypted mails on Gmail.

Of course you may also setup IMAP/POP access to the gmail account on a Outlook/Thunderbird and use encryption just as you use for your corporate account.

Author Comment

ID: 39710928
the gmail account is that of an employee, we have no control over it.
We want to send sensitive information, is the as is situation enough to send encrypted email or do we need to do something on both our corporate email side AND his gmail account before he will be able to read encrypted email.
Thank you
LVL 15

Expert Comment

by:Giovanni Heward
ID: 39710929
Here's the steps involved to properly secure email.

cryptography summary


Alice wants to send a message to Bob and provide confidentiality, integrity, proof of origin and proof of receipt.


To protect the secrecy of her message contents, she uses a symmetric cipher to encrypt it. For that she uses a symmetric key. This produces a ciphertext message.


To protect the accuracy of the message, she uses a hashing algorithm that condenses the arbitrary-length message to a fixed-size message digest value.


To prove the message actually came from her, Alice signs the message by encrypting the hash value with her private key. The sum of the message digest encrypted with Alice's private key results in a digital signature.


This digital signature is then appended to the bottom of the symmetrically encrypted message. Now in order for Bob to read, prove the origin, and check the accuracy of the message, he must reverse all of the encryption done above.


To read the message, Bob needs a copy of the symmetric key. Alice encrypts it using asymmetric encryption and encrypts the symmetric key with Bob's public key, producing a ciphertext key.


Bob decrypts the ciphertext key with his private key to give him his copy of the symmetric key.


Bob uses the symmetric key to decrypt the message with that key and read it.


Bob decrypts Alice's digital signature using Alice's public key. Once the decryption process is complete, he is left with the message digest.


But, he has yet to prove the integrity of the message or the proof of origin. He must prove the message digest value is correct. To do this, Bob must rehash the message that he has received and decrypted.


If the message digest that he generates from the message matches the message digest that he decrypted from Alice's digital signature, then he has proof of integrity and proof of origin.


To prove that he received the actual message Alice sent, Bob re-encrypts the message digest with his private key, which will result in his digital signature.


Bob sends his digital signature back to Alice.


Alice decrypts Bob's digital signature using his public key to produce the message digest.


She compares the message digest she just received to the message digest she originally generated. If these two message digests match, then she has proven that her message was received by Bob (proof of receipt) in its correct format (proof of integrity).
LVL 15

Accepted Solution

Giovanni Heward earned 2000 total points
ID: 39710936
The short answer, you may choose between PGP or S/MIME.  In your situation, S/MIME seems to already be in place.

All the gmail users need to do is have Personal Digital Certificates issued and installed in a client, such as Outlook.  This can be done for free.

Step 1:  Get Certificate

Step 2: Install in Outlook

Instructions for Signing an Email and Encrypting an Email are included in the Step 2 link above.

Bear in mind, in order to encrypt email between two parties both parties need to have exchanged their public certificates.  This can be achieved by sending a signed email to each other.

Additional benefits (such as Non-repudiation) are available through S/MIME as well.

Anything encrypted in transit should be encrypted at rest, S/MIME accomplishes both.

3rd party products exist (which are not supported natively by most email clients)--- such as PGP, could achieve your goals as well.

Expert Comment

ID: 39710940
the gmail account is that of an employee, we have no control over it.
We want to send sensitive information, is the as is situation enough to send encrypted email or do we need to do something on both our corporate email side AND his gmail account before he will be able to read encrypted email.
Thank you

I´m supposing you are using on the corporate side S/MIME for encryption, that is the most widely used standard in corporations. Can you confirm that?

Anyway, the gmail user will need to setup on his side a plugin like penango to be able to read emails. Moreover, he will need to have a digital certificate for his email, and this certificate needs to be known to the sender (installed, available on a repository, etc.). Then the sender will be able to use the certificate to encrypt messages and the receiver to open it.

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this step by step procedure, you will come to know the details of creating an Outlook meeting in 2007, 2010, 2013 & 2016.
Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
In this Experts Exchange video Micro Tutorial, I'm going to show how small business owners who use Google Apps can save money by setting up what is called a catch-all email address in their Gmail accounts. By using the catch-all feature, small busin…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question