January 29, 2002
Practical Aspects of Modern Cryptography
39
Using Public Key Encryption
n
n
Now that we have all of these tools
available, how do we actually send a
(short) message, perhaps a
symmetric key, encrypted with a
public key?