# Asymmetric Encryption
#cyber-security #security #encryption
Also known as public key cryptography where messages are Encrypted with the public key can only be Decrypted with the private key. the Private key can also sign the document to prove the authenticity of the creator.
SSL/TLS and SSH uses this technique to securely transmit data.