Encryption
Figure 15-8:
Public key
encryption