Figure 2:
Encryption workdone at Sender Node.