Bob wants to send a private message to Alice. He creates the message, and encrypts it using a symmetric key. He then sends this encrypted cipher text to Alice.

Alice receives the cipher text and decrypts it into the original plain text message using a copy of the same key that Bob used to encrypt it.

This entire process relies on Bob getting the symmetric key to Alice securely.