Fair enough, I hadn't realised they used a key pair, which is why I asked.

I have to deal with encryption on a daily basis in my job due to sensitive data so am fully aware of how they work.
Thank you for explaining how you guys do it.
Plus looking through the source, my other idea would take an eternity (brute force the key) due to the length of the key.