answersLogoWhite

0


Best Answer

Asymmetric encryption can provide confidentiality in two ways:

1) messages encrypted using the public key of the recipient can only be decrypted using the private key of the recipient - which only the recipient should possess.

2) It can be used as part of a negotiation process between two users to establish a temporary shared key through a process such as the following:

  • User A sends a challenge message to user B which is encrypted with user B's public key to initiate secure communications.
  • User B decrypts the message and sends the correct response back to user A encrypted with user A's public key
  • The two users are now authenticated to each other
  • At this point A can send a proposed symmetric key to B encrypted with B's private key
  • All further communications are encrypted via the shared symmetric key

In this second scenario, the asymmetric encryption only facilitates the establishment of confidentiality via the eventually shared symmetric key by securing the initial negotiations.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

9y ago

Asymmetric encryption also known as Public key cryptography uses two keys. A private key (a secret key) and a public key. Suppose if person A sends a message to B using Asymmetric encryption.

Person A encrypts the message with B's public key. Upon receiving the message, B decrypts the message (cipher text) using his (B's) private key. When B is sending a message to A, this process is reversed. B encrypts the message with A's public key and when A receives it, A decrypts it using A's private key.

Key authentication is the process of assuring that the public key of "person A" held by "person B" does in fact belong to "person A" and vice versa.So since there is a private key which is a secret, is involved in the process, we can say it provides authentication.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How does asymmetric encryption provide confidentiality?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Public key encryption is also known as asymmetric encryption?

Yes. Public Key encryption (or asymmetric encryption) requires a pair of keys; a public and a private key for exchanging data in a secure manner.


Does a VPN use symmetric or asymmetric encryption?

PKI must use asymmetric encryption because it is managing the keys in many cases. This implies the use of public and private key pairs, which is asymmetric.


Why is encryption use?

Mostly for performance - symmetric encryption is much much faster (order of magnitudes) than asymmetric encryption.


Who or what types of website or companies use symmetric key encryption?

If you are using an encrypted channel, then at some point everyone uses symmetric encryption. It is fast (compared to asymmetric).The first part of an encrypted conversation will probably use asymmetric encryption to provide the shared private key that is later on used for the bulk part of data conversations on an encrypted channel.


Why is symmetric encryption used?

Mostly for performance - symmetric encryption is much much faster (order of magnitudes) than asymmetric encryption.


Are asymmetric encryption mathematically related to one another?

Yes


In asymmetric encryption the key are mathematically related to one another?

Yes


What is used to decrypt a file in asymmetric encryption?

A public and private key


Are the asymmetric encryption keys mathematically related to one another?

Yes


Are asymmetric encryption keys mathematically related to one another?

Yes


Which two items are used in asymmetric encryption?

private and primary key


In asymmetric encryption the keys mathematically related to one another?

Yes