From one of the customer we have received an encrypted file and a public key, and we have been asked to check if we are able to decrypt the file using the public key provide