The image shows the step to generated decrypted keys by executing commands.