Asymmetric Key Example
Person A
Person B
Each Person can now use the other persons public key to Encrypt a message for them
Only the private key (which was never sent across the network) can Decrypt
My readable message to person B
The readable message from person A
Bad Hacker