There’s a server, a client, and a hacker in a network. For encryption, the client and the server need to share their private keys. Wouldn’t the hacker be able to grab those during their transmission and decrypt further messages as they please?
Adding on to your TLDR: There's also asymmetric cryptography based on elliptic curves, so it's not always an exponent of two massive primes.
Even of isogenies of elliptic curves
Confidentiality Integrity Availability
Adding on to your TLDR: There's also asymmetric cryptography based on elliptic curves, so it's not always an exponent of two massive primes.
Even of isogenies of elliptic curves