<P> Note: The sender and receiver do not usually carry out the process mentioned above manually though, but rather rely on sophisticated software to automatically complete the EPKE process . </P> <P> The goal of Public Key Encryption (PKE) is to ensure that the communication being sent is kept confidential during transit . </P> <P> To send a message using PKE, the sender of the message uses the public key of the receiver to encrypt the contents of the message . The encrypted message is then transmitted electronically to the receiver and the receiver can then use their own matching private key to decrypt the message . </P> <P> The encryption process of using the receiver's public key is useful for preserving the confidentiality of the message as only the receiver has the matching private key to decrypt the message . Therefore, the sender of the message cannot decrypt the message once it has been encrypted using the receiver's public key . However, PKE does not address the problem of non-repudiation, as the message could have been sent by anyone that has access to the receiver's public key . </P>

Can we create private key from public key