Email Encryption PGP for Mobile Devices

A Message Encrypted to your Public Key can only ever be Decrypted with your Private key because they are mathematically related. It is however impossible to derive the Private Key from having only the Public Key.

The infrastructure Systems are certified as using GKM (Guarded Key Mode) — This means that the Users have an additional Passphrase on the system to protect their Private Keys. The User defined Secret Password on their device is also Encrypted to their Private Key for security and is required to unlock the private key for use in decrypting messages. A user can access the system at the point of sale and enter their own personalized Passphrase if desired.
 Servers automatically delete Encrypted Messages held every 6 hours to allow for users whose devices are off due to travel time etc to be able to retrieve their messages. When a user deletes a message manually on their Smartphone it is deleted throughout the system automatically.

Encryption Service for Mobile Devices — How does it work?

The sequence of events taking place in PGP encryption is as follows:

  1. The first task of PGP is to compress the plain text. Compressing data bolsters cryptographic security and saves valuable transmission time.
  2. A Session Key is then created by PGP. This is a single time secret key. The session key generated in a random manner from unique movements of your computer’s mouse and the keystrokes as the message is typed. The Session Key functions in tandem with an extremely secure encryption algorithm and the compressed text is encrypted.
  3. Once encryption is complete, Session Key is encrypted with the Public Key of the recipient. This Session Key is then transmitted to recipient with the previously compressed and encrypted message.
  4. When the recipient receives the message key, the PGP copy decrypts the temporarily generated Session Key by using the copy of the Private Key. The message after decryption and decompress can be read.

It is to be noted that recipients’ public keys are automatically retrieved if you have messaged them before. In such cases, Public Key of your recipient is stored or cached on smartphone. This is the reason when you remake your keys, any user whom you have messaged previously must clear his or her phone’s cache. If this is not done, the user will be encrypting bases on the old Public Key when sending you a message. In this case, it will not be possible for you to decrypt the message. is a well-known firm specializing in PGP encryption. We offer the latest technology to meet all your communication needs. Our encrypted handsets are available in USA, Canada, Thailand, Spain, UK , Mexico, Panama, Dominican Republic and Australia.

Originally published at