|
Bob wants to send private information to Alice.
- Both create public and private keys and send their public keys to each other.
- Bob creates his message, encrypts it with Alice's public key, and sends the cipher text to her.
- Alice receives the cipher text and decrypts it with her private key.
Because only Alice's private key would decipher the text, privacy is assured.
|