It is an asymmetric key algorithm which works on the principle of a public and private key. The sender uses the recipient's public key to encrypt the message, and the recipient uses their own private key to decrypt it.
It is an asymmetric key algorithm which works on the principle of a public and private key. The sender uses the recipient's public key to encrypt the message, and the recipient uses their own private key to decrypt it.