***********************************************************
* Description: Knowledge of SSH RSA public and private key
* Compatiablity: RDBMS 11g, 12c
* Date: 02:55 PM EST, 04/15/2017
***********************************************************


<1> Public/Private Key Cryptography:
     |
     |__ Or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
         This accomplishes two functions: authentication, which is when the public key is used to verify that a holder of the paired private key sent the message, and encryption, 
         whereby only the holder of the paired private key can decrypt the message encrypted with the public key.

         In a public key encryption system, any person can encrypt a message using the public key of the receiver, but such a message can be decrypted only with the receiver's private key. 
         For this to work it must be computationally easy for a user to generate a public and private key-pair to be used for encryption and decryption.
		 
		 
<2> Analogy:
     |
     |__ Simple speaking, we should call public "Lock" & private "Key" more accurate. Please take "View" as a reference.