The process involves the sender encrypting the email content with a secret key before sending it. The recipient, who also possesses the same key, decrypts the email to access the original content. The challenge lies in securely sharing the secret key between the sender and the recipient.