1. This simply generates keys for alice bob and ken. 2. encrypt a simple message bob to alice. 3. include bob's signature 4. to send a larger message use AES. Generate a symmetric key using RSA keys 5. encrpyt using AES 6. alice decrypts 7. alice verifies it's from bob - which it should 8. alice verifies it's from ken - which isn't shouldn't.