The technical papers, articles and book chapters on Public Key are difficult, if not impossible, for lay people to understand.. So this slide set has been put together to help those people (and students) to get a grip on the fundamental mechanisms. Experts in the field are therefor asked to excuse the analogies used and the omission of all mathematics, but the ‘key’ here is simplicity of concept and clarity of communication without a complete bastardization of the subtleties of the actual method/
Public-key mostly implies cryptographic system requiring two separate keys or codes, one of which is secret and one can be public. It can also be used in terms of ‘secure software containers’ which is used for the exemplar model here. The two keys can also be ‘secret’, static or dynamic, and communication can be one-to-one or one-to-many.