Very helpful for a course I’m taking on Computer Security. Excellent article. Perhaps a future version of this article may include how Public Key Cryptography works in an example application such as the chat program Whatsapp. This will tie the analogy nicely to how it is applied. But as it is, the article is very useful in demystifying a perceived difficult concept of ICT.