It must be computationally infeasible to determine the private key from chosen plaintext attack
Attacker can pick any message, have it encrypted, and obtain the ciphertext
How does PKC Work?
The public key is used by the sender to encrypt information, whereas the private key is used by a recipient to decrypt it. The public key can be shared without compromising the security of the private one. All asymmetric key pairs are unique, so a message encrypted with a public key can only be read by the person who has the corresponding private key.
The keys of a pair are mathematically related, and their length is much longer than those used in symmetric cryptography. So, it is not easy to decipher the private key from its pubic counterpart. RSA is one of the most common algorithms for asymmetric encryption in use today.
Exchanging keys
Alice and Bob want to communicate using a block cipher to encrypt their messages, but don’t have shared key
How do Alice and Bob get a shared key?
Solution 1
Alice sends the key along with her encrypted message