Asymmetric Key Example
Person A
Person B
Each Person starts with 2 Related Keys
One is Private
One is Public
The public keys are cloned and distributed to everyone
Bad Hacker