7 The Role Of Asymmetric Cryptography And Secure Enclaves Zero Trust Authentication Master Class Beyond Identity