Public-key cryptosystems emerged to address issues in symmetric encryption, specifically key distribution and digital signatures. Users generate a pair of keys, with one public and one private, enabling secure message encryption, decryption, and authentication. Requirements for effective public-key cryptography include easy key generation, efficient encryption and decryption processes, and strong resistance against adversaries attempting to derive private keys or original messages.