Answer: RSA infrastructure
Step-by-step explanation:
Using this infrastructure we can implement asymmetric cryptography using a pair of public key and private key. It works on the mechanism that if one of the key is used for encryption the other key is used to decrypt the message.