Public Key Cryptography
Another method for exchanging a session key is to use
Public key cryptography. This algorithm is asymmetric-it uses a set of related keys. If one key is used to encrypt the message, the other is used to decrypt it, and vice versa. This means that if each party holds one of the keys, a session key can be securely exchanged. In the typical arrangement, each party has their own set of these asymmetric keys, One of the pairs is known as the private key and the other as the public key. Public keys are exchanged and private keys are kept secret. Even if a public key becomes,well,public, it does not compromise the system. Ii’s meant to be shared openly