Cryptography: Principles of Information Security, 2nd Edition 1
Cryptography: Principles of Information Security, 2nd Edition 1
Uses two different but related keys; either key can encrypt
or decrypt message
Highest value when one key serves as private key and the
other serves as public key