Symmetric encryption utilizes __________, while asymmetric encryption utilizes _________.
Public keys, one time
Shared keys, private keys
Private keys, session keys
Private keys, public keys
Symmetrical systems require the key to be private between the two parties. With asymmetric systems, each
circuit has one key.
In more detail:
* Symmetric algorithms require both ends of an encrypted message to have the same key and processing
algorithms. Symmetric algorithms generate a secret key that must be protected. A symmetric key, sometimes
referred to as a secret key or private key, is a key that isn’t disclosed to people who aren’t authorized to use the
* Asymmetric algorithms use two keys to encrypt and decrypt data. These asymmetric keys are referred to as
the public key and the private key. The sender uses the public key to encrypt a message, and the receiver uses
the private key to decrypt the message; what one key does, the other one undoes.