- uses two keys: a public key known to everyone and a private or secret key known only to the recipient.
- matching pairs are generated by an encryption algorithm ( private and public keys)
- (mathematically linked but can't be derived from one another)
- A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient's private key, too. Anyone intercepting the message cannot decrypt it because he or she does not have the private key.