answersLogoWhite

0


Best Answer

This answer depends on who is sending the information in a secure manner. If confidentiality is required, then the public key of the receiver is used to encrypt the message. If integrity is desired then your private key would be used to encrypt the message.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which key is used to encrypt data in an asymmetric encryption system?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is an accurate description of an asymmetric encryption technology?

It is an encryption process that uses a public and private key pair to encrypt/decrypt data.


What is the meaning of encrypts?

The meaning of asymmetric encryption is that one key that is unique to a recipient is used only to decrypt data instead of a key being used to encrypt and decrypt that data.


Which type of encryption technology uses two keys to encrypt and decrypt data?

If the keys are different, then it is asymmetrical. If it is the same key used twice to encode and decode; then it is symmetrical.


Difference between symmetric and asymmetric key cryptography?

Symmetric cryptography uses the same secret (private) key to encrypt and decrypt its data whereas asymmetric uses both a public and private key. Symmetric requires that the secret key be known by the party encrypting the data and the party decrypting the data. Asymmetric allows for distribution of your public key to anyone with which they can encrypt the data they want to send securely and then it can only be decoded by the person having the private key. This eliminates the need of having to give someone the secret key (as with symmetric encryption) and risk having it compromised. The issue with asymmetric is that it is about 1000 times slower than symmetric encryption which makes it impractical when trying to encrypt large amounts of data. Also to get the same security strength as symmetric, asymmetric must use strong a stronger key than symmetric. If you do a quick search on the differences between symmetric and asymmetric you can find many more explanations. This just a quick overview.


What is the process of converting readable data into unreadable characters to prevent unauthorized access?

You would either encrypt the data, or and, encrypt the folder or hard drive, flash drive, etc.


Public key encryption is also known as asymmetric encryption?

Yes. Public Key encryption (or asymmetric encryption) requires a pair of keys; a public and a private key for exchanging data in a secure manner.


What is symmetric and asymmetric?

From another user: Symmetric cryptography uses the same secret (private) key to encrypt and decrypt its data whereas asymmetric uses both a public and private key. Symmetric requires that the secret key be known by the party encrypting the data and the party decrypting the data. Asymmetric allows for distribution of your public key to anyone with which they can encrypt the data they want to send securely and then it can only be decoded by the person having the private key. This eliminates the need of having to give someone the secret key (as with symmetric encryption) and risk having it compromised. The issue with asymmetric is that it is about 1000 times slower than symmetric encryption which makes it impractical when trying to encrypt large amounts of data. Also to get the same security strength as symmetric, asymmetric must use strong a stronger key than symmetric.


Is a public key encryption system that can verify the authenticity of an email sender and encrypt email data in transmission?

PGP (Public Good Privacy)


What is the meaning of asymmetric encryption?

Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt. Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it. While common, this property is not essential to asymmetric encryption. Asymmetric Encryption is also known as Public Key Cryptography, since users typically create a matching key pair, and make one public while keeping the other secret. Users can "sign" messages by encrypting them with their private keys. This is effective since any message recipient can verify that the user's public key can decrypt the message, and thus prove that the user's secret key was used to encrypt it. If the user's secret key is, in fact, secret, then it follows that the user, and not some impostor, really sent the message. Users can send secret messages by encrypting a message with the recipient's public key. In this case, only the intended recipient can decrypt the message, since only that user should have access to the required secret key. The key to successful use of Asymmetric Encryption is a Key Management system, which implements a Public Key Infrastructure. Without this, it is difficult to establish the reliability of public keys, or even to conveniently find suitable ones.


How do you get encryption key from software?

It's pretty simple. When you encrypt your data with any software (say for example, Data Protecto) you will automatically get your encryption keys. The p[assword of which will be known only by you.


What is the purpose of the Microsoft EFS?

Microsoft EFS stands for Encryption File System. This is used when you want to encrypt and protect your data and personal information from others by using a password.


What is disk encryption software used for?

A disk encryption software is used to encrypt all the data on a disk. Once a disk is encrypted, then unauthorized personnel cannot access the data storage in the disk.