1. Obtains Alice's public key. 4. Encrypts the symmetric key underneath the key encapsulation scheme, utilizing Alice's public key. In a cloud setting, encryption with envelope encryption includes generating a DEK regionally, encrypting one's data using the DEK, after which issuing a request to wrap (encrypt) the DEK with a KEK stored in a doubtlessly more safe service.
When you adored this post in addition to you desire to get more info regarding kindly pay a visit to the site.