application of public key cryptographypublic key cryptography standardsasymmetric key cryptographypublic key cryptography examplesecret key cryptographyasymmetric key cryptography exampleasymmetric key cryptography algorithmsrsa public key cryptographypublic key encryptionpublic key cryptosystemasymmetric keypublic key algorithms