This document summarizes public key cryptography and asymmetric encryption algorithms. It discusses how public key cryptography uses two different but mathematically related keys, a public key for encryption and a private key for decryption. The public key can be shared openly, while the private key is kept secret by the recipient. It also describes how asymmetric algorithms are slower than symmetric algorithms but allow anyone to encrypt messages for a recipient using their public key, with only the recipient able to decrypt it with their private key. Examples of asymmetric algorithms discussed include RSA.