<?xml version="1.0" encoding="utf-8" ?><rss version="2.0"><channel><title>Bing: Asymmetric Key Encryption</title><link>http://www.bing.com:80/search?q=Asymmetric+Key+Encryption</link><description>Search results</description><image><url>http://www.bing.com:80/s/a/rsslogo.gif</url><title>Asymmetric Key Encryption</title><link>http://www.bing.com:80/search?q=Asymmetric+Key+Encryption</link></image><copyright>Copyright © 2026 Microsoft. All rights reserved. These XML results may not be used, reproduced or transmitted in any manner or for any purpose other than rendering Bing results within an RSS aggregator for your personal, non-commercial use. Any other use of these results requires express written permission from Microsoft Corporation. By accessing this web page or using these results in any manner whatsoever, you agree to be bound by the foregoing restrictions.</copyright><item><title>Asymmetric Encryption - GeeksforGeeks</title><link>https://www.geeksforgeeks.org/computer-networks/what-is-asymmetric-encryption/</link><description>Asymmetric encryption, also known as public-key cryptography, is a type of encryption that uses a pair of keys to encrypt and decrypt data. The pair of keys includes a public key, which can be shared with anyone, and a private key, which is kept secret by the owner.</description><pubDate>Mon, 27 Apr 2026 22:27:00 GMT</pubDate></item><item><title>What is asymmetric encryption? - IBM</title><link>https://www.ibm.com/think/topics/asymmetric-encryption</link><description>Asymmetric encryption keeps data secure by using cryptographic algorithms to generate a pair of keys: a public key and a private key. Anyone can use the public key to encrypt data, but only those with the right private key can decrypt that data to read it.</description><pubDate>Mon, 27 Apr 2026 07:10:00 GMT</pubDate></item><item><title>Public-key cryptography - Wikipedia</title><link>https://en.wikipedia.org/wiki/Public-key_cryptography</link><description>In an asymmetric key encryption scheme, anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. The security of the system depends on the secrecy of the private key, which must not become known to any other.</description><pubDate>Tue, 28 Apr 2026 03:56:00 GMT</pubDate></item><item><title>What is asymmetric encryption? - Cloudflare</title><link>https://www.cloudflare.com/learning/ssl/what-is-asymmetric-encryption/</link><description>Asymmetric encryption, also known as public key encryption, uses a public key-private key pairing: data encrypted with the public key can only be decrypted with the private key. TLS (or SSL), the protocol that makes HTTPS possible, relies partially on asymmetric encryption.</description><pubDate>Mon, 27 Apr 2026 15:03:00 GMT</pubDate></item><item><title>What is Asymmetric Cryptography? Definition from SearchSecurity</title><link>https://www.techtarget.com/searchsecurity/definition/asymmetric-cryptography</link><description>Asymmetric cryptography, also known as public key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.</description><pubDate>Mon, 09 Feb 2026 15:08:00 GMT</pubDate></item><item><title>What is Asymmetric Cryptography? - cybersecuritynews.com</title><link>https://cybersecuritynews.com/what-is-asymmetric-cryptography/</link><description>Unlike symmetric cryptography, which uses a single key for encryption and decryption, asymmetric cryptography employs a pair of keys to perform these functions separately. The public key is openly shared and used to encrypt data, while the private key is kept secret and used to decrypt data.</description><pubDate>Fri, 24 Apr 2026 19:31:00 GMT</pubDate></item><item><title>Types of Encryption Explained: Symmetric vs. Asymmetric, AES vs. RSA - Prey</title><link>https://preyproject.com/blog/types-of-encryption-symmetric-or-asymmetric-rsa-or-aes</link><description>Symmetric encryption uses one shared key (e.g., AES) and is fast—best for encrypting large amounts of data at rest or in transit. Asymmetric encryption uses a public/private key pair (e.g., RSA or ECC) and is slower—ideal for key exchange, authentication, and digital signatures.</description><pubDate>Mon, 27 Apr 2026 20:47:00 GMT</pubDate></item><item><title>Asymmetric Cryptography: RSA, ECC &amp; PKI Explained</title><link>https://destcert.com/resources/asymmetric-cryptography/</link><description>With asymmetric cryptography, you eliminate that single point of failure. Anyone can encrypt using your public key, but only your private key, which is stored securely in a hardware module, can decrypt it. That means even if a partner’s system is breached, your internal data remains protected.</description><pubDate>Thu, 23 Apr 2026 03:26:00 GMT</pubDate></item><item><title>What is Asymmetric Encryption &amp; Its Main Principles | Okta</title><link>https://www.okta.com/identity-101/asymmetric-encryption/</link><description>Asymmetric encryption (also known as asymmetric cryptography) allows users to encrypt information using shared keys. You need to send a message across the internet, but you don't want anyone but the intended recipient to see what you've written. Asymmetric encryption can help you achieve that goal.</description><pubDate>Mon, 27 Apr 2026 06:06:00 GMT</pubDate></item><item><title>Asymmetric encryption | Cloud Key Management Service - Google Cloud</title><link>https://docs.cloud.google.com/kms/docs/asymmetric-encryption</link><description>Asymmetric encryption is the process of using a public key from a public/private key pair to encrypt plaintext, and then using the corresponding private key to decrypt the ciphertext. Asymmetric...</description><pubDate>Mon, 27 Apr 2026 07:18:00 GMT</pubDate></item></channel></rss>