资讯

Using public key cryptography, Alice sends her message to Bob and encrypts it using his public key. Anyone can intercept the message, but only Bob can decrypt it using his private key.