Asymmetric Cryptosystems
Uses 2 keys - public and private
RSA - Use factoring for Authentication, actually encrypt with private key and send with public key to confirm it is the owner of private key, digital signature, crackable with small keys, need to use at least 4048 bits
Elliptic-curve cryptography (ECC) - good security with smaller keys