Public Key Cryptography provides confidentiality, integrity, authentication, and non-repudiation through techniques like asymmetric encryption, digital signatures, hashes, and key exchange. It uses public/private key pairs based on hard mathematical problems like factoring and discrete logarithms. Common algorithms include RSA for encryption/signatures and Diffie-Hellman for key exchange. Signatures are generated with the private key and verified with the public key to authenticate messages and identities.