A perpetrator looking to gain access to and gather information about encrypted data being transmitted over the network would use:
Upon receipt of the initial signed digital certificate the user will decrypt the certificate with the public key of the: