Which areas would be most affected in your organisation if public‑key cryptography were compromised?