First page
Back
Continue
Last page
Overview
Graphics
Encrypting the shared key - diagram
Use a symmetric cipher with a randomly generated key. Use a public key cipher to encrypt the session key, and send it along with the encrypted document.