Asymmetric Encryption: How It Works