We all hear often about the reused key issue in block cipher.
For example, for a picture being encrypted by the electronic codebook mode, we will still see the shape of the picture. https://images.app.goo.gl/Hw8c9xDHcmi7nCNg6
So that is why we need initialization vector to increase the randomization. That is why CBC, OFB, CFB, CTR come to the world. Session key, block cipher key should not be repeatedly used. Repeated use will create the hints to sniffer as they might find some pattern.
So here is my question, why we seldom hear about the reused key issue in RSA or Asymmetric encryption, it has no action about Initialization vector. If i have a same plaintext, everytime i used the same public key to encrypt, i will still get the same cipher.
My answer is that Asymmetric encryption is always used in exchange key, key is always a random number so it will be hard for sniffer to get the same cipher. But in case Asymmetri encryption one day be used in the session key, some further mechanism has to be added.
Can someone help to comment my thought?