Browsing: weaknesses of asymmetric key cryptography