Bob wants to send private information to Alice.

  1. Both create public and private keys and send their public keys to each other.
  2. Bob creates his message, encrypts it with Alice's public key, and sends the cipher text to her.
  3. Alice receives the cipher text and decrypts it with her private key.

Because only Alice's private key would decipher the text, privacy is assured.