Person A wants to send an encrypted file to Person B.
Person A encrypts the file using Person B’s public encryption key.
Person A then send the encrypted file to Person B.
Person B then uses Person B’s private Encryption key to decrypt the file.
Questions related to this exchange:
How does Person A (an AxCrypt user) get the public key from Person B?
What if Person B is not an AxCrypt User but has another encryption vendor? (pubic/private key encryption should not depend on the application software)