Public key cryptography-implementation using R-2R ladder network