Encryption, decryption and authentication can be provided by public key encryption technology, allowing transfer of mail with privacy. This is achieved by generating two keys. One key is called the "private" key, this the user of the software holds on to in a safe place. The other key is called the "public" key, this is transmitted across the internet and stored in a public database which other people can access. A sender needs to find the user's "public" key in the database to encrypt the message he is sending. The receiver uses his "private" key to "unlock" the message sent to him. This prevents other people from reading the mail message because they do not have the "private" key needed to unscramble the electronic mail.