This is the foundation of asymmetric key cryptography, where two different keys are used for encryption and decryption.