This graphic illustrates how host B can encrypt and sign a message sent to host A. Host B uses A's public key for encryption and host B's private key for the signature. Host A uses A's private key for decryption and host B's public key to verify the signature.