This document provides an overview of public-key cryptography. It discusses how public-key cryptography uses two keys, a public key for encryption and a private key for decryption. The document outlines the key principles of public-key cryptography including key distribution and digital signatures. It also describes the basic public-key cryptosystem process and categories of public-key cryptography including encryption/decryption, digital signatures, and key exchange. The document concludes with requirements for public-key cryptography and examples of applications and cryptoanalysis techniques.