1. Bob prepares a message.
2. Bob creates a session key.
3. Bob encrypts the message using symmetric key cryptography and the session key.
4. Bob encrypts the session key using asymmetric key cryptography and Alice's public key.
5. Bob attaches the encrypted session key to the encrypted message and sends it to Alice.
6. Alice decrypts the session key using her private key.
7. Alice uses the decrypted session key to decrypt the message.
Draw a diagram that should include Alice, Bob, and Eve.