## Which two statements describe the use of asymmetric algorithms? (Choose two.)

- If a private key is used to encrypt the data, a private key must be used to decrypt the data.
- If a public key is used to encrypt the data, a public key must be used to decrypt the data.
- Public and private keys may be used interchangeably.
- If a private key is used to encrypt the data, a public key must be used to decrypt the data.
- If a public key is used to encrypt the data, a private key must be used to decrypt the data.

**Answers Explanation & Hints:**Asymmetric algorithms use two keys: a public key and a private key. Both keys are capable of the encryption process, but the complementary matched key is required for decryption. If a public key encrypts the data, the matching private key decrypts the data. The opposite is also true. If a private key encrypts the data, the corresponding public key decrypts the data.