When an email is sent, it can be encrypted using an encryption key to prevent unauthorized access during transmission. Upon receipt, the recipient uses a decryption key to convert the encrypted message back to its readable form. This process ensures that even if the email is intercepted, it cannot be read without the decryption key.