Hello. When someone uses my public key to encrypt a message to me, what prevents them from trying to use an encryption algorithm of his choice. In other words, does the public key itself limit the options available to the person sending the message? Thanks. John