Page 128 - CISSO_Prep_ Guide
P. 128
The digital signature is appended to the end of the message we
wish to send to Bob. Then message (with the attached digital
signature) is encrypted using a symmetric algorithm.
Then we encrypt the symmetric key used to encrypt the message
with the public key of the recipient (Bob).
We send the encrypted symmetric key and the encrypted
message to Bob. This is called a digital envelope.
When Bob gets the digital envelope, he will decrypt the
symmetric key using his private key.