In this chapter, we’ll spend time getting familiar with how asymmetric encryption is typically used, where it is a critical part of communication privacy, but not responsible for all of it. Typically, asymmetric encryption, also known as “public key cryptography”, is used to establish a trusted session between two parties, and the communication while within that session is protected with much faster symmetric methods.
Let’s dive in with a short example and some code! ...