separate keys: one private and one public.  Asymmetric-key cryptography is based on personal secrecy.  Examples of algorithms: RSA, El Gamal, Diffie-Hellman  Examples of protocols using public key algorithms: PGP, Secure Socket Layer (SSL), Secure Shell (SSH), Bitcoin encrypt BOB Hello Alice! Alice’s Public Key 4f60ce544b43c13f1d Decrypt ALICE Hello Alice! Alice’s Private Key