014.02.16.4. Public-key cryptography is a cornerstone of SSH's security model. Can you explain how this form of cryptography works, especially the roles of the public and private keys, and how it differs from symmetric key cryptography?
In symettric key cryptography , all the details are visible to the clients, whereas, in public-key cryptogrhapy, client has a public key to the system, but if the server doesn't allow the connection through its private key, it can't be initiated. Private key is private to the user while public is availble to the whole network. In symmetric key cryptography, the whole network can access the sensitive information on the system whereas, in public-private key cryptography, the information remains protected.