Encryption
Figure 15-17: Private key encryption