ThorTeaches.com has recently suffered a data breach, and you need to upgrade the encryption methods being used to protect sensitive information. Which type of encryption uses two different keys, a public key and a private key, to encrypt and decrypt data?