On Wednesday 16 September 2009 04:04:56 pm David-Sarah Hopwood wrote: > They use signature algorithms, which are asymmetric cryptography, but > not asymmetric encryption. Ah, that makes sense then. Thanks. Shawn.