Page 119 - CISSO_Prep_ Guide
P. 119
As can be seen from this diagram, Alice can choose a secret
symmetric key that she wants to use to talk confidentially with
Bob. She can securely send the symmetric key to Bob by
encrypting the symmetric key with Bob's public key. Since it is
encrypted with Bob's public key, Bob must open it with Bob's
private key - and since he is the only person that would have his
private key - the message (which in this case is a symmetric
key) can only be accessed by Bob. Then when Alice sends a
secret message to Bob that is encrypted with the symmetric key
they just shared, Bob will have the symmetric key he needs to
decrypt the secret message.
So rule number two for asymmetric algorithms is: