Sender (Alice)
Generate a key pair, share your public key, then encrypt a message for Bob using his public key.
Private Key
Public Key
Bob's Public Key
Plaintext for Bob
Cyphertext for Bob
Recipient (Bob)
Generate your key pair, share your public key, then decrypt Alice's ciphertext using your private key.
Private Key
Public Key
Alice's Public Key
Cyphertext from Alice
Plaintext from Alice
Eavesdropper (Eve)
Eve can intercept public keys and ciphertext, but cannot decrypt without the private keys.