first, information that needs to be exchanged is encrypted and assigned two secret keys –public key and private key. This encrypted information can be decrypted