Asymmetric Cryptography Weaknesses Job Application