Encryption algorithms -- Part 2: Asymmetric ciphers