Which of the following statements are true about asymmetric key encryption?
A.
It uses a pair of keys, one public and one private, that are unique and mathematically linked.
B.
It uses one key that is shared by both parties in the data exchange.
C.
It is faster than symmetric key encryption.
D.
It can be used in conjunction with symmetric key encryption in order to securely share a
common encryption key.
E.
It can be used to produce and verify digital signatures.
Explanation:
A:Public (asymmetric) key encryption uses a pair of keys, one private and one
public.
The public key is freely distributed to any party that may wish to send encrypted data.
Once encrypted, data can only be decrypted with the private key. Therefore the
private key is maintained by the receiving party and is not shared with anyone else.
The two keys are mathematically related, but can’t be used to discover each other.
D: A combination of symmetric and asymmetric encryption is often used.
Reference: Oracle Reference Architecture,Security, Release 3.1