-
Suppose Alice wants to send a secure e-mail to Bob, she should do the following steps:
- Generate a random session key Ks and encrypt it using Bob’s public key using RSA algorithm.
- Encrypt the plain text e-mail using DES with the session key Ks generated in step (i).
- Send both the encrypted session key generated in step (i) Ks along with the encrypted email generated in step (ii).
-
On the receiver side, Bob should do the following steps upon receiving an-email from Alice:
- Decrypt the received session key Ks, using Bob’s private key.
- Use the retrieved session key to decrypt the received e-mail.