Public key cryptography uses two mathematically related keys, a public key and a private key, to encrypt and decrypt messages. The public key is used to encrypt messages and can be shared widely, while the private key is used to decrypt messages and must be kept secret by the recipient. Some applications of public key cryptography include digital signatures to authenticate senders and encrypting messages so that only the intended private key holder can decrypt them. The document then provides examples of cases where law enforcement has sought access to encrypted data for investigations.