Assumptions:
public/private key encryption requires no authentication - a recipient not in possession of the private key reads only gibberish