Question 2 -- 10 points
Suppose Rex has a message that he wants to send across the internet
to his business colleague and lover June. Explain the steps that each
must go through to set up and use public key encryption. Include the
encoding and decoding functions. What assumptions does public key
encryption make (I.e. what must be true for the communication to be
truly secure)?