2nd part: Public Key (Asymmetrical) Cryptography