Question 1

What actually are the public and private keys ?

Question 2

What actually a MITM attack does ?

Question 3

Which asymmetric encryption algorithm makes uses of big prime numbers ?

{{flash_text2}}