When Thomas wants to send a secret
message to Peter, Thomas gets Peter's public key to encrypt the message.
When Peter received his encrypted message via the Internet, Peter's private key
is used to decrypt it. The following figure is an overview of the process.