Asymmetric Encryption: Definition, Architecture, Usage