Asymmetric encryption can provide confidentiality in two ways:
1) messages encrypted using the public key of the recipient can only be decrypted using the private key of the recipient - which only the recipient should possess.
2) It can be used as part of a negotiation process between two users to establish a temporary shared key through a process such as the following:
In this second scenario, the asymmetric encryption only facilitates the establishment of confidentiality via the eventually shared symmetric key by securing the initial negotiations.
Copyright © 2026 eLLeNow.com All Rights Reserved.