answersLogoWhite

0

Asymmetric encryption can provide confidentiality in two ways:

1) messages encrypted using the public key of the recipient can only be decrypted using the private key of the recipient - which only the recipient should possess.

2) It can be used as part of a negotiation process between two users to establish a temporary shared key through a process such as the following:

  • User A sends a challenge message to user B which is encrypted with user B's public key to initiate secure communications.
  • User B decrypts the message and sends the correct response back to user A encrypted with user A's public key
  • The two users are now authenticated to each other
  • At this point A can send a proposed symmetric key to B encrypted with B's private key
  • All further communications are encrypted via the shared symmetric key

In this second scenario, the asymmetric encryption only facilitates the establishment of confidentiality via the eventually shared symmetric key by securing the initial negotiations.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

Public key encryption is also known as asymmetric encryption?

Yes. Public Key encryption (or asymmetric encryption) requires a pair of keys; a public and a private key for exchanging data in a secure manner.


Does a VPN use symmetric or asymmetric encryption?

PKI must use asymmetric encryption because it is managing the keys in many cases. This implies the use of public and private key pairs, which is asymmetric.


Why is encryption use?

Mostly for performance - symmetric encryption is much much faster (order of magnitudes) than asymmetric encryption.


Why is symmetric encryption used?

Mostly for performance - symmetric encryption is much much faster (order of magnitudes) than asymmetric encryption.


Who or what types of website or companies use symmetric key encryption?

If you are using an encrypted channel, then at some point everyone uses symmetric encryption. It is fast (compared to asymmetric).The first part of an encrypted conversation will probably use asymmetric encryption to provide the shared private key that is later on used for the bulk part of data conversations on an encrypted channel.


Are asymmetric encryption mathematically related to one another?

Yes


What is used to decrypt a file in asymmetric encryption?

A public and private key


Are asymmetric encryption keys mathematically related to one another?

Yes


In asymmetric encryption the key are mathematically related to one another?

Yes


In asymmetric encryption the keys mathematically related to one another?

Yes


Which two items are used in asymmetric encryption?

private and primary key


Are the asymmetric encryption keys mathematically related to one another?

Yes