Public key systems are asymmetric cryptographic systems. Most encrypted transactions over the Internet use a
combination of private/public keys, secret keys, hash functions (fixed values derived mathematically from a text
message) and digital certificates (that prove ownership of a public encryption key) to achieve confidentiality,
message integrity, authentication and nonrepudiation by either sender or recipient (also known as a public
key infrastructure [PKI]). Essentially, keys and hash values are used to transform a string of characters into a shorter
or fixed-length value or key that represents the original string. This encryption process allows data to be stored and
transported with reduced exposure so data remains secure as it moves across the Internet or other networks.