Figure 2: Encryption workdone at Sender Node.