
 Today in Russia, an increasing number of employees use personal mobile devices in the workplace. This phenomenon, called 
BYOD (Bring Your Own Device), necessitates the protection of corporate data, which, above all, is important for organizations with high requirements for information security.
BYOD policy is very effective both in small companies and in large corporations. First of all, it allows you to significantly save on the purchase of office equipment and provides employees with the opportunity to always stay in touch with colleagues and get access to working documents and company resources from any place. In addition, in many companies, managers use BYOD as a way to attract and retain qualified professionals. Employees who are accustomed to their devices are not particularly happy when the employer tells them that it is prohibited to use a personal phone or tablet at the workplace and will have to work with the equipment provided by the company. It looks archaic and restrictive. Especially if the equipment provided by the employee is worse than the advanced gadgets belonging to him.
At the same time, the thoughtless and uncontrolled use of personal devices in the company can cause irreparable damage to it. Therefore, in order to achieve the desired effect, company executives are required to grope a rather thin line between potential risks and potential benefits.
')
Most employees use personal mobile devices to access corporate email. Therefore, in this article we will look at the email encryption setting algorithms on mobile devices running iOS (5+) and Android (4+), which can be useful in organizing the protection of corporate mail. 
In both cases, to configure the encryption function, we need:
- Root Certification Authority certificate in X.509 format (file with * .cer extension). To create it, we will use CyberSafe encryption software , which can work as a Certification Authority . The CyberSafe root certificate is automatically created and installed in the trusted Windows certificate store when you first start the program. After that, we export the certificate to a separate file .
- personal certificate of the user in the PKCS # 12 format (file with the * .pfx extension), for the creation and export of which we also use CyberSafe. For more information about these certificates, as well as about exporting a pfx file, see the article Encryption of mail in Outlook 2010 .
Creation of certificates, as well as their subsequent distribution to employees of the company, may be entrusted to one person - the system administrator. The system administrator creates pfx certificates on his computer for all users who plan to use mail encryption on their mobile device, exports these certificates into separate files and then sends each of the users along with the certificate of the Certification Center and detailed instructions for setting up the encryption function. Also, he must tell each user his password to the pfx file.

Email Encryption on iOS Mobile Devices
1. We send the received certificates (the key file .pfx and the certificate file of the root Certification Center .cer) to the e-mail installed on the phone, or transfer them to any folder (including in the horse folder) via usb connection to the computer.
2. Create an email account on your phone. To add a new account, click 
Add . After creation, open 
Settings . Next 
Mail, addresses, calendars (Fig. 1) - 
The name of your account (in this example, it is 
Dorf pop (Fig. 2). - 
Account. (In this example, 
vostrikov@dorf.ru (Fig. 3). Assumed that your mail account is already configured.
3. Click on your account, mail settings open. Click 
Advanced (Figure 4). In advanced settings, use 
S / MIME . Next, click the button 
Uch. Record (Fig. 5). In the Account menu, click 
Finish to save the settings.

4. Select 
Account again 
- Advanced . If we go to the 
Encryption and 
Signature tabs, we will see that there are currently no suitable encryption certificates installed. (Fig. 6-7). The 
Certificates tab is now inactive, so we need to install the certificates created earlier.
5. Install the certificate of the Certification Center. Once we click on the file with the * .cer extension (Fig. 8). Select 
Install (Fig. 9). A warning page will open. Click 
Install (Fig. 10). Certificate Certification Center installed. Click 
Finish to return to the mail menu (Fig. 11).

6. Install a personal certificate. Once we click on the file with the extension * .pfx (Fig. 12). Click 
Install (Fig. 13). A warning page will open. Click Install (Fig. 14).
7. Enter the password for the certificate. It is identical to the password you set when creating your personal certificate in CyberSafe. Click 
Next (Fig. 15). Profile is installed. Click 
Finish .

8. Go to 
Settings - General Profiles tab (Fig. 16). Now the profiles of the Certification Authority and User Certificate are installed (Fig. 17). By clicking on them, you can get more information about certificates.
9. Go to 
Settings - Mail, addresses, calendars - Name of your account - Your account - Advanced. We see at the bottom of the option 
Signature and 
Encryption . Click on them one by one and install certificates for signing (Fig. 18) and encryption (Fig. 19). Click 
Advanced - Account . In the window, click 
Finish to save the settings.

10. Similarly, the recipient creates and installs certificates on his phone, and then sends you a test letter. In the letter, he marks the option 
Sign . Having received the letter, we open it and see that it is signed (Fig. 20).
11. Click on the sender's email inscription (in this example, click on the email address anton@dorf.ru). We see that the certificate is trusted because a single Certificate Authority was used (Fig. 21). Click 
View Certificates . On the 
Certificate page, click 
Install (Fig. 22). Then click 
Finish .
12. Create a message to the recipient. Since we have already set the 
Encrypt and 
Sign options above, these options are enabled by default in the email. We send the recipient a letter (Fig. 23). The recipient, in turn, similarly installs your certificate. After that, the recipient can send you a test letter to verify encryption. In the letter, he notes 
Encrypt and 
Sign .
13. When viewing a test letter (Fig. 24), we see that the letter was decrypted, and the sender's certificate was correctly installed, and is in the list of trusted messages (Fig. 25). Email encryption is configured.

Email Encryption on Android Mobile Devices
1. We send the received certificates (the key file .pfx and the certificate file of the root Certification Center .cer) to the e-mail installed on the phone, or transfer them to any folder (including in the horse folder) via usb connection to the computer.
2. Since Android OS does not support encryption of mail through certificates, to configure encryption, we will use the 
djigzo program, which can be downloaded to the phone through the 
Play market .
3. After installing the program, go to the Main menu. To install certificates, go to 
Sertificattes & Keys (Figure 1). Use the 
Menu key to call the submenu for installing certificates and keys (Fig.2).
4. Select 
Import Sertificattes to import certificates (Figure 3). In the explorer, select the path to your certificate. Now we are installing the certificate of the Certification Center. This file has the extension * .cer. Here it is the file support@cybersafesoft.com.cer (Fig. 4). Select it from the list by clicking on the certificate, and add it to the list of certificates.

5. Next, in the list, select the root certificate support@cybersafesoft.com.cer. It is in the list of all certificates available on the phone (Fig. 5). Click on the certificate and in the context menu select the option 
Move to root store (Fig. 6). With this action, we add the certificate to the list of root certificates for the program.
6. Select 
Import Keys (Figure 2). Enter password. This is the password you specified when creating your personal certificate in CyberSafe on your computer (Fig. 7). In Explorer, select the path to the * .pfx file. In this example, this file is anton@dorf.ru.pfx (Fig.8).
7. Set a new password to the keystore (Fig.9). Click 
OK . The certificate and private key are imported (Figure 10).

8. 
Settings - Account . Set the necessary account settings, tick the box 
Sign, Encrypt, Add Signature line (Fig. 11).
9. 
Settings - SMTP . Install the mail settings (Fig. 12-13).
10. Check the installation of certificates and keys. Go to the option 
Compose message . Set the checkboxes on 
Sign and 
Encrypt and send any message to yourself. (Fig. 14-15).

11. Go to any email client on the phone. We see a message with a blue dot. This is our received message (Fig. 16). Open the letter, then use one of two options: Option 1. Click on the attachment in the .p7m format and select 
Open with the help of - djigzo in the context menu. Next - see p. 13. Option 2. Save the attachment in the .p7m format to the phone. Next - see p. 12.
12. Open the djigzo. Option 
Open message . In the explorer we find the saved file, click on it (Fig. 17).
13. Enter the password to the keystore. The message is decrypted (Fig. 18).
14. Messaging is controlled by the telephone's 
Menu button.
15. In order to exchange encrypted messages with partners, you need to send them a signed letter.
To do this, select the 
Compose message option in the program menu (Fig. 19). Set a tick on 
Sign , do not click the 
Encrypt button. We send the letter. The program will ask for the key store password. Enter the password, click 
OK .

16. The recipient must install your certificate in their program. Now he sends the signed letter to you. We receive a message (Fig. 20), open it. We see the smime.p7m attachment (Fig. 21). Save it to your phone (Next - see p. 17), or click on the attachment, and in the context menu select 
Open with - djigzo . (Further - see p. 18).
17. Open the djigzo program. Option 
Open messag e (Fig. 22). In Explorer, select the path to the saved file (Fig. 23).
18. Enter the password keystore.
19. We see that the message is decrypted, (Fig. 24) and the sender's certificate is in the list of certificates (Figure 25).

Email encryption is configured.