Asymmetric encryption can accomplish both authentication and non-repudiation. Asymmetric encryption differs from symmetric encryption because it uses two keys: one to encrypt the data and another to decrypt it.