separate keys: one private and one public. Asymmetric-key cryptography is based on personal secrecy. Examples of algorithms: RSA, El Gamal, Diffie-Hellman Examples of protocols using public key algorithms: PGP, Secure Socket Layer (SSL), Secure Shell (SSH), Bitcoin encrypt BOB Hello Alice! Alice’s Public Key 4f60ce544b43c13f1d Decrypt ALICE Hello Alice! Alice’s Private Key