Browsing: the strengths of asymmetric key cryptography