sajad torkamani

Suppose Bob wants to send a private message to Alice that he doesn’t want anyone to be able to intercept and read. How can he do this?

He can use asymmetric key encryption as follows:

What if Alice wants to send a secure message to Bob so that a third-party can’t intercept it? The above process is essentially reversed: Bob generates his own public and private key pair, Alice uses Bob’s public key to encrypt, and Bob uses his public key to decrypt Alice’s message.