Public Key Encryption and Digital Signature: How do they work?