10. Draw a diagram explaining how you can use an asymmetric encryption algorithm (or public key cryptography) to maintain confidentiality of messages exchanged between two users Alice (sender) and Bob (receiver). Make sure you identify (label) the sender receiver, public keys, private keys, encryption operation and decryption operation clearly in the diagram. c-Mend 0 ← verification Show transcribed image text 10. Draw a diagram explaining how you can use an asymmetric encryption algorithm (or public key cryptography)
OR
OR