Email encryption and email archiving: How can the two be combined?

Do you already know how email encryption works and which different encryption methods are available? And how to combine email encryption with an email archiving solution? In fact, is it actually possible to archive encrypted emails? If you have no answer to these questions yet, this blog post will help you understand the basics of email encryption and email archiving and show you how to archive encrypted emails. But let’s start at the beginning.

Why do we use email encryption in the first place?

Emails travel from one server to the next on their way from sender to recipient. If they are not encrypted prior to sending, they are vulnerable to attack by third parties both en route and on the servers themselves. Crooks could intercept or even tamper with these emails, which is why it is advisable to encrypt sensitive data.

The financial or reputational loss resulting from an attack on personal or corporate data can be considerable; nor should the repercussions of violations of the GDPR be underestimated.

According to a Virtru study, only significantly less than 50 percent of emails are client-side encrypted, many people regard encryption as simply too complex. We’ll look at what is meant by too complex later on in this post.

Email Encryption

Which parts of an email are actually encrypted?

Only the actual body of the email is encrypted: It is not possible to encrypt information such as the sender, recipient, destination, date of delivery, IP address, and subject line. Yet because even this data will often harbor internal and sensitive information, it is up to the respective company to decide whether email encryption actually makes sense and adds value.

Apropos: Transport Encryption

In order to keep an email’s subject line and its content as secret as possible, and to provide a certain measure of protection against the unauthorized reading of unencrypted emails during transmission, SSL/TLS encryption at transport level should ideally always be used. In fact, this approach is already much more widely used than email encryption itself. Another reason for the more widespread use of transport encryption is the EU’s GDPR that entered into force at the end of May 2018. Professional software solutions, such as MailStore Server for email archiving, attach great importance to transport encryption.

After this brief introduction to the subject of email encryption, we want to explain why an email archiving solution really should form part of your overall data governance strategy.

Why do we use email archiving in the first place?

Every day, a wealth of information, including invoices, contracts, and other business-critical content is sent around the globe in the form of emails. With an email archiving solution in place emails can be stored on a long-term basis and their contents remain unchanged. Email archiving primarily serves the purposes of making data retrievable and available for a longer period of time. In addition, it serves the purpose of preventing data loss and documentation.

This is why a professional email archiving solution should be a significant component of your data governance strategy.

But how do you archive something that’s encrypted?

As a general principle, emails are archived in the form in which they enter the archive, so encrypted emails remain encrypted even during archiving and cannot be read by users, e.g. when conducting an archive search. In order to combine email encryption with an email archiving solution in a purposeful way, it is important to compare the different encryption methods and consider the disadvantages in each case, which we will examine again at a later stage.

Client-based or server-based encryption?

Encryption and decryption can take place either on the clients – known as conventional client-based (or end-to-end) encryption – or on the email server or an email gateway (generally a firewall), in which case it is server-based:

  • With client-based encryption, only the sender and recipient are able to read the emails. The data is encrypted on the sender’s system, so that only the intended recipient can decrypt and read the messages, which cannot be read or tampered with by third parties.
  • With server-based encryption, the emails are encrypted on the email server or an email gateway when leaving or arriving at the company. The user is no longer involved in the actual encryption process per se, and is unaware of it when sending and receiving emails.

Apropos: Asymmetric Encryption

The most common email encryption processes, S/MIME and PGP, always use asymmetric encryption. This type of encryption was developed in the early 1980s and comprises pairs of keys. The public key used to encrypt messages may be disseminated widely, while the private key used exclusively to decrypt the information is known only to the recipient and is generally also password protected.

Incidentally, the same keys are used for digital signatures. In this case, the private key is used to sign the email and the public key to verify the signature.

Disadvantages of the two encryption methods

In order to settle the issue of which type of encryption is better suited to email archiving, we need to look at the disadvantages of the two processes in more detail, as both client-based and server-based encryption are feasible:

Disadvantages of client-based encryption:

  • Introducing this type of encryption system can be extremely complex and entail high administrative costs (e.g. for training all users).
  • A great deal of time and effort may be spent on resolving recurrent user IT administration issues, for instance in relation to signature error messages, key handling, or expired certificates.
  • There is no comprehensive SPAM or virus protection, as encrypted emails cannot be vetted and can, therefore, constitute a security risk when they enter the corporate environment unchecked.
  • Either the user keys must be stored at a central location or every email has to be additionally (doubly) encrypted with a main key.
  • There is no enterprise-wide, robust security system, as each individual user can decide how strictly he or she complies with corporate policies on encrypting confidential information. Users may simply forget the encryption process altogether, leading to emails being sent in unencrypted form.
  • Another risk factor for the company is that a lost encryption key cannot be restored. This may give rise to legal risks with respect to emails, as the loss of a key could prevent some archived emails from being examined.
  • The forwarding of emails could also prove problematic if this compromises the integrity of the encrypted part of the message.
  • The fact that the emails are backed up and archived in encrypted form might contravene statutory regulations due, among other things, to their restricted readability. Nor would it be possible to search for the content of an encrypted email in the archive.
  • If a user is absent due to vacation or illness, has left the company in the meantime, or if a new private key has been generated for any reason, the content of an archived email can no longer be accessed.

Disadvantages of server-based encryption:

  • There may be the risk of a man-in-the-middle (MITM) attack. However, it is easy to minimize the risk of a successful attack of this nature via the additional use of transport encryption between client and server.
  • This requires an appropriate infrastructure or the use of a service provider.

Email Encryption

Our conclusion

Despite several disadvantages, email encryption is useful and necessary for certain types of company. Client-based encryption can entail a number of complications – for example when it comes to email archiving, however. We, therefore, recommend the use of server-based email encryption.

To sum up, server-based encryption offers the following key advantages:

  • A spam and virus check can be performed before the email enters the corporate environment.
  • This solution allows archiving and indexing in the email archive, for example with the email archiving solution MailStore Server.
  • All users can access emails in unencrypted form.
  • The user is not directly involved in either the encryption or the decryption process, thereby ensuring that the data remains secure.

Sponsored by MailStore Software

Images: Shutterstock

About The Author

1 thought on “Email encryption and email archiving: How can the two be combined?”

  1. I do agree with your post that encryption is a must for mitigating the damage caused by breaches and data loss, and the use of an archiving solution such as MailStore or any other well-known archiving solution would be beneficial to any companies.

    However, I strongly disagree that gateway encryption should be preferred over end-to-end encryption. most of the disadvantages you mentioned about end-to-end encryption are solved by different providers and products. The below article by Sam Andoni (CTO and specialist in PKI )and Fred Sadler, who was the director for the Freedom of Information Act and Privacy Act office describes the same concern about end-to-end encryption but provides answers and workaround for mostly all the concerns, sighting a product by Zeva Inc. as an example.

    https://www.forbes.com/sites/forbestechcouncil/2018/06/05/the-case-for-end-to-end-encryption/#5a5ac3e319ac

    https://www.ciodive.com/press-release/20160608-end-to-end-encryption/

    Also, several compliance Acts such as HIPAA enforces the use of end-to-end encryption from sender to recipient.

    https://compliancy-group.com/hipaa-encryption/

    At the end of your email, you concluded that server-based encryption will allow for spam and virus check and give the ability for archiving solutions to read and index emails. While this is true, but it is also true for end-to-end encrypted emails using the proper decryption software, to create an ultimate bundle that enables end-to-end encryption while retain the capability to support eDiscovery and FOIA requests.

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top