Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

Asymmetric | Training Camp
Global Accelerated Learning • Est. 1999
Glossary Term Asymmetric

Training Camp • Cybersecurity Glossary

What is Asymmetric?

Not identical on both sides. In cryptography, key pairs are used, one to encrypt, the other to decrypt.

Glossary > Asymmetric

Understanding Asymmetric

Not identical on both sides. In cryptography, key pairs are used, one to encrypt, the other to decrypt. Asymmetric cryptography uses mathematically related but different keys for encryption and decryption, a public key that can be shared and a private key that must be kept secret. This approach addresses the key distribution problem inherent in symmetric cryptography. Asymmetric encryption is foundational to secure communications on the internet, used in protocols like TLS, SSH, and technologies like digital signatures and PKI. Organizations implement asymmetric cryptography for secure email communications, authenticating connections, and establishing secure channels. For example, when you connect to an HTTPS website, asymmetric encryption is used to establish the initial secure connection before switching to faster symmetric encryption. Related terms: Public key cryptography, RSA, ECC, Digital signatures, Key exchange, PKI.

Learn More About Asymmetric:

Ready to Get Certified?

Turn knowledge into credentials. Browse our instructor-led cybersecurity courses.

View All Courses →