When confidentiality is the primary concern, and a secure channel for key exchange is not available, which of
the following should be used for transmitting company documents?
Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys are referred to as the
public key and the private key. Asymmetric algorithms do not require a secure channel for the initial exchange
of secret keys between the parties.