How Asymmetric Public Key Encryption Works