Asymmetric Cryptographic Practices