answersLogoWhite

0


Best Answer

If the keys are different, then it is asymmetrical. If it is the same key used twice to encode and decode; then it is symmetrical.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

Asymmetric algorithms

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which type of encryption technology uses two keys to encrypt and decrypt data?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is an accurate description of an asymmetric encryption technology?

It is an encryption process that uses a public and private key pair to encrypt/decrypt data.


What is the process of converting readable data into unreadable characters to prevent unauthorized access?

You would either encrypt the data, or and, encrypt the folder or hard drive, flash drive, etc.


Why does encrypted data often look like gibberish to unauthorized users?

The purpose of encryption is to make a message/data unreadable to someone who does not have the key to decrypt it, so it is highly likely that encrypted data will appear to be gibberish.


What is the meaning of 128 bit key in encryption?

In encryption, a key is the information used to encrypt the data. 128 bit means that the key is 128 bits long (a bit is a single unit, or "bit" of data, either 0 or 1). The longer the key, the more complex the encrypted data becomes. 128 bits is considered a strong key length.


How do you decrypt a data file to that has been encrypted with the users public key?

When you reference a "public key" you are implying that the file has been encrypted using "asymmetric cryptography". In asymmetric cryptography, encryption and decryption depend on a key PAIR. The user retains their private key and publishes their public key. Anyone can encrypt a file using the user's public key and send it to them. The only person who should be able to decrypt a file encrypted with that public key is the holder of the private key - which, unless the user has made the mistake of sharing their private key - means that only the original user can decrypt the messages sent to them. Most of the asymmetric encryption algorithms use pretty much the same method to decrypt that was used to encrypt, but use the "other" key from the key pair. Messages encrypted using the private key can only be decrypted using the public key - which provides some authentication that the message indeed came from the holder of the private key. Messages encrypted using the public key can only be decrypted by the holder of the private key, so messages sent to them should be secure.

Related questions

What is an accurate description of an asymmetric encryption technology?

It is an encryption process that uses a public and private key pair to encrypt/decrypt data.


What is the meaning of encrypts?

The meaning of asymmetric encryption is that one key that is unique to a recipient is used only to decrypt data instead of a key being used to encrypt and decrypt that data.


How data encrypt and decrypt from PC to PC using micro controller?

How data encrypt and decrypt from PC to PC using micro controller?


What is DES in ecommerce?

DES stands for Data Encryption Services which uses encryptrion or decryption services in which the sender & reciever share a single common key to encrypt or decrypt the message.


What is conventional encryption?

Conventional encryption ciphers rely on a single key for both encryption and decryption. Modern protocols will use a private key for encryption and a different public key for decryption. These two keys are mathematically related in a fashion that allows them to encrypt/decrypt the same data successfully.


What is the process of converting readable data into unreadable characters to prevent unauthorized access?

You would either encrypt the data, or and, encrypt the folder or hard drive, flash drive, etc.


What encryption requires both sides of an encrypted conversation to use an encrypted key to be able to encode and decode the data?

Any shared private key method - symmetric encryption.


What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt itAnswer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.


What does aes stand for in terms of encryption?

AES stands for Advanced Encryption Standard. This standard was put in place by the National Institute of Standards and Technology and can be used to encrypt data for software, firmware, hardware or any combination thereof.


How can you find out your icription code?

The following steps will help you: # Learn to spell encryption. # Figure out which encryption code it is that you want decrypted, because there are millions of possible things to encrypt. # Figure out how the thing that you want decrypted IS encrypted; i.e. which algorithm has been used to encrypt the data. # Get a program that already knows how to decrypt something that uses said algorithm. If you find such a program, go to step 8. If you can not obtain a program that is able to decrypt that data, go to step 5. # Learn to program. # Study mathematics and learn about cryptography. # If it is theoretically possible to decrypt the data you want to decrypt, write a program that will do so, with your years of cryptographic research. If it is not theoretically possible to do so, with a classical computer, study physics and get your PhD and work on Quantum Computation until they invent a QC that can crack the encrypted data, and write the program that can run on the QC, which of course relies on a whole new branch of mathematics and physics. # Use the program you've obtained/written to crack the encryption. # ... # Profit!


How can you find out your code?

The following steps will help you: # Learn to spell encryption. # Figure out which encryption code it is that you want decrypted, because there are millions of possible things to encrypt. # Figure out how the thing that you want decrypted IS encrypted; i.e. which algorithm has been used to encrypt the data. # Get a program that already knows how to decrypt something that uses said algorithm. If you find such a program, go to step 8. If you can not obtain a program that is able to decrypt that data, go to step 5. # Learn to program. # Study mathematics and learn about cryptography. # If it is theoretically possible to decrypt the data you want to decrypt, write a program that will do so, with your years of cryptographic research. If it is not theoretically possible to do so, with a classical computer, study physics and get your PhD and work on Quantum Computation until they invent a QC that can crack the encrypted data, and write the program that can run on the QC, which of course relies on a whole new branch of mathematics and physics. # Use the program you've obtained/written to crack the encryption. # ... # Profit!


How do you get encryption key from software?

It's pretty simple. When you encrypt your data with any software (say for example, Data Protecto) you will automatically get your encryption keys. The p[assword of which will be known only by you.