January 29, 2002
Practical Aspects of Modern Cryptography
39
Using Public Key Encryption
n
nNow that we have all of these tools available, how do we actually send a (short) message, perhaps a symmetric key, encrypted with a public key?