Document public key and private keys in teh glossary
diff --git a/docs/glossary.rst b/docs/glossary.rst
index 4421fca..666e77d 100644
--- a/docs/glossary.rst
+++ b/docs/glossary.rst
@@ -26,9 +26,29 @@
         Cryptographic operations where encryption and decryption use the same
         key.
 
+    public-key cryptography
     asymmetric cryptography
         Cryptographic operations where encryption and decryption use different
-        keys. There are separate encryption and decryption keys.
+        keys. There are separate encryption and decryption keys. Typically
+        encryption is performed using a :term:`public key`, and it can then be
+        decrypted using a :term:`private key`. Asymmetric cryptography can also
+        be used to create signatures, which can be generated with a
+        :term:`private key` and verified with a :term:`public key`.
+
+    public key
+        This is one of two keys involved in :term:`public-key cryptography`. It
+        can be used to encrypt messages for someone posessing the corrosponding
+        :term:`private key` and to verify signatures created with the
+        corrosponding :term:`private key`. This can be distributed publicly,
+        hence the name.
+
+    private key
+        This is one of two keys involved in :term:`public-key cryptography`. It
+        can be used to decrypt messages which were encrypted with the
+        corrosponding :term:`public key`, as well as to create signatures,
+        which can be verified with the corrosponding :term:`public key`. These
+        **must** be kept secret, if they are exposed, all encrypted messages
+        are compromised, and an attacker will be able to forge signatures.
 
     authentication
         The process of verifying that a message was created by a specific