# Asymmetric cryptography ## Public/private key pairs ## Common algorithms and typical uses encryption, signatures, key exchange ## Performance and key management implications