#### Answer Description

In asymmetric encryption, there are two keys (generally public and private keys), anything encrypted with one key, can only be decrypted with the opposite key.

#### Wikipedia

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys,which are known only to the owner The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions Effective security only requires keeping the private key private the public key can be openly distributed without compromising securityIn such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key Robust authentication is also possible A sender can combine a message with a private key to create a short digital signature on the message

Public-key_cryptography - Wikipedia, the free encyclopedia