Comment Re:Wrong (Score 1) 254
Actually, only RSA public-key cryptography is based on that asymmetry, and even that is not precisely correct. And RSA is considered the most probable candidate to be broken at some time of the bunch of algorithms that are used. Even ssh uses DSA (at least you should, and not use RSA if you are paranoid) which is based on the assumed difficulty of calculating discrete logarithms in finite fields. If you are even more paranoid, use something that is based on elliptic curves.