To activate encryption, a signed e-mail must first be sent to the recipient. The recipient then replies with an e-mail signed by him or her. Only now can both sides send encrypted e-mails to the other contact.

This procedure is necessary for all contacts if encrypted communication is to take place. The key exchange takes place once with each contact within the certificate period.