Basic Techniques For Asymmetric Encryption