How do the trapdoors, within asymmetric algorithms, correspond with encryption, decryption, signature generation, and signature verification process?