1. Public key cryptography uses asymmetric key encryption where each user has a public key for encryption and a private key for decryption.
2. The RSA algorithm is an example of public key encryption that uses modular exponentiation with large prime numbers to encrypt plaintext and decrypt ciphertext.
3. Diffie-Hellman key exchange allows two users to securely exchange a secret key over an insecure channel without any prior secrets.