Question 2 -- 10 points

Suppose Rex has a message that he wants to send across the internet to his business colleague and lover June. Explain the steps that each must go through to set up and use public key encryption. Include the encoding and decoding functions. What assumptions does public key encryption make (I.e. what must be true for the communication to be truly secure)?