Alice decrypts the session key using her private key


1. Bob prepares a message. 
2. Bob creates a session key. 
3. Bob encrypts the message using symmetric key cryptography and the session key. 
4. Bob encrypts the session key using asymmetric key cryptography and Alice's public key. 
5. Bob attaches the encrypted session key to the encrypted message and sends it to Alice. 
6. Alice decrypts the session key using her private key. 
7. Alice uses the decrypted session key to decrypt the message. 
Draw a diagram that should include Alice, Bob, and Eve. 

Request for Solution File

Ask an Expert for Answer!!
Data Structure & Algorithms: Alice decrypts the session key using her private key
Reference No:- TGS083426

Expected delivery within 24 Hours