Just to expand on what The Term has stated,
Hush mail and any other secure e-mail all use some sort of encyption authentication. (ex. LDAP, KERBEROS) These methods require a public key transfer. If your destination email account does not have a public key he will not be able to decrypt your...