It is a type of symmetric-key encryption algorithm that changes a fixed length of block text into same length of Cipher text.
Encryption works by means of key and Decryption is the reverse of encryption process using the same key.
The encryption method is based on simple XOR of binary bits. It encrypts one bit at a time.
The key sequence is generated on highly complex mathematical algorithms. LFSR based on primitive polynomials and combination of several LFSR using linear and nonlinear logic provides a very high level of complexity.
In this system a user chooses a pair of prime numbers so large that factorizing the product is beyond all computing capabilities.
Stages of sending the message by this method.
The receiver, M, distributes his public key pair.
The sender, F, composes a plain text message, m , and then uses Ms public key to encrypt the message and from cipher text, c . c is the remainder left when m is raised to the power of e and divided by the modulus n .
Military cryptography for encryption may still remain mainly symmetric key based for obvious reasons.
Public key cryptography would develop more in near future particularly in the context of key exchange and digital signatures.
Simultaneously , the challenging area of the cryptanalysis, being the other side of the development exercise will gain the importance in the view of the plethora of applications demanding assured security.