1. If Alice and Bob need to communicate using asymmetric-key cryptography, how many keys do they need? Who needs to create these keys?
2. Why do you think asymmetric-key cryptography is used only with small messages.
3. In an asymmetric public key cipher, which key is used for encryption? Which key is used for decryption?
a. public key
b. private key