First page Back Continue Last page Image
- Each Person can now use the other persons public key to Encrypt a message for them
- Only the private key (which was never sent across the network) can Decrypt
- My readable message to person B
- The readable message from person A