How Asymmetric Encryption Works