1. [20p] Assuming two computer users: Alice and Ben want to communicate securely using the Private Key Encryption System. Provide a detail explanation with all the steps required in the Private Key encryption system. You must draw an original diagram Read More …