key exchange hash algorithms symmetric vs asymertric encryption digital signatures / certificates / PKI