Here are some graphics to go along with the above discussion.
Symmetric Key Encyrption:
Asymmetric Key Encryption:
As you can see, with Asymmetric Key Encryption, Alice still needs to give Bob her public key.
–Konrad, WA4OSH