1) Node A and Node B agree on a cryptosystem.
2) Node B sends its public key to Node A.
3) Node A encrypts the message using the agreed public key (Cipher) and Node B’s public key.
4) Node B decrypts the coded message using its private key and the agreed cipher from 1.