Asymmetric cryptography in depth — RSA, elliptic curves, Diffie-Hellman, key exchange, digital signatures, and certificate chains. The mathematical foundations and practical applications that make secure communication possible without shared secrets.