Page 119 - CISSO_Prep_ Guide
P. 119

As can be seen from this diagram, Alice can choose a secret
            symmetric key that she wants to use to talk confidentially with
            Bob. She can securely send the symmetric key to Bob by
            encrypting the symmetric key with Bob's public key. Since it is
            encrypted with Bob's public key, Bob must open it with Bob's
            private key - and since he is the only person that would have his
            private key - the message  (which in this case is a symmetric
            key) can only be accessed by Bob. Then when Alice sends a
            secret message to Bob that is encrypted with the symmetric key
            they just shared, Bob will have the symmetric key he needs to
            decrypt the secret message.

            So rule number two for asymmetric algorithms is:
   114   115   116   117   118   119   120   121   122   123   124