Compare and contrast symmetric and asymmetric encryption including: the number of keys included, key management and distribution, relative speed, operations executed on data, etc. In public key encryptions it possible to first to encrypt with a private key and then decrypt with a public key?