Definitions for

**"Asymmetric Encryption"****Related Terms:**Public key encryption, Public key cryptography, Private key, Public-key cryptography, Public-key encryption, Public key, Key pair, Private key encryption, Symmetric key, Pkc, Secret key, Asymmetric cryptography, Public/private key pair, Key, Symmetric encryption, Encryption key, Symmetric cryptography, Session key, Symmetric algorithm, Symmetric-key cryptography, Ciphertext, Cryptosystem, Preshared key, Cryptography, Encryption algorithm, Rsa encryption, Public-key infrastructure, Diffie-hellman, Cipher suite, Perfect forward secrecy, Hmac, Key recovery, Data encryption key, Public key cryptography standards, Cryptographic key, Idea, Dek, Triple des, Cipher, Pretty good privacy, Pgp, Ike, Rc4, Message authentication code, One-time pad, Cryptanalysis, Rc5, Pfs , Initialization vector, Tkip

Two different keys are used with one for encryption and the other for decryption. The decryption key cannot be derived from the encryption key.

A form of cryptosystem in which encryption and decryption are performed using two different keys, one of which is referred to as the public key and one of which is referred to as the private key. Also known as public-key encryption.

Encryption that permits the key used for encryption to be different for the key used for decryption. RSA is the most widely used asymmetric encryption algorithm.

Asymmetric or public key cryptography is based on the concept of a key pair. Each half of the pair (one key) can encrypt information so that only the other half (the other key) can decrypt it. One part of the key pair, the private key, is known only by the designated owner; the other part, the public key, is published widely but is still associated with the owner.

An algorithm that uses one key to encrypt information but requires a different (related) key to decrypt that information. This is also referred to as public key cryptography. Because the key used to encrypt information cannot decrypt it, something very useful can be done. You can make one of the two keys available to anyone - the public key. The other key you must keep to yourself. Provided people know your public key, anyone receiving information that decrypts with your public key knows that the information must have come from you. More than that, if you encrypt something with someone else's public key you can be certain that only they can access is, regardless of who else sees the encrypted information. These features have created the concepts of PKI and non-repudiation.

In public key (asymmetric) encryption, two mathematically-related keys are used: one to encrypt and the other to decrypt. These two keys combine to form a key pair. Asymmetric encryption provides both data encryption and validation of the communicating partiesâ€(tm) identities, and is considered more secure than symmetric encryption, even though it is computationally slower. In practice, a VPN implementation will often use asymmetric encryption to verify a senderâ€(tm)s identity and the messageâ€(tm)s content(See digital signature, message digest), and use symmetric encryption to protect the privacy of the message content. Also known as Public Key Encryption

Asymmetric encryption was invented independently by academic cryptographers at Stanford University in the USA and by military cryptographers at Britain's GCHQ. It is the basis of public key infrastructure (see PKI), although a 'public' key is not strictly necessary. Information is encrypted by using one key of a pair and can only be de-crypted using the other key. In public key encryption, this allows anyone to communicate securely with an entity using his/her/its public key as the entity can de-crypt the information using their (secret) private key.

cryptographic system, also referred to as public-key encryption or public-private key pairs, that uses two keys -- a public key known to everyone and a private key, or secret key, known only to the recipient of the message. When a user wants to send a secure message to another user, they use the recipient's public key to encrypt the message. The recipient then uses a private key to decrypt it. An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to determine the private key if you know the public key.

a.k.a. Public Key Encryption A method of securing data for transmission that equips each user with two keys, a private key and a public key. Each individual uses the otherâ€(tm)s public key to encrypt the data that is sent and then each individual uses their own private key to decrypt the data received. A trusted third party often provides keys.

Type of encryption in which an encryption key (the public key) is used to encrypt a message, and another encryption key (the private key) is used to decrypt the message. See also: hash function, private key, public key, symmetric encryption

Also known as public key encryption. Encryption where one key is used to encrypt a message (the public key) and another to decrypt the message (the private key).

One key is used to encrypt and another, different key to decrypt.

The sender and receiver have different complementary encryption keys. One key is private and the other key is usually public. If A wants to send B an encrypted file, he gets hold of the public key via the WWW. This key can only be used to encrypt the file. To decrypt it, B requires the private key that only he has. This method is technically very time consuming, although it is also very secure.