Note that the cryptographic keys used for for encryption and decryption needn’t be symmetrical
(i.e., identical). Indeed, for public-key encryption systems the cryptographic keys are asymmetrical
. See the What is public-key encryption? FAQ
In addition to encryption and decryption algorithms, cryptographic keys can be used for other cryptographic algorithms, such as digital signature schemes and message authentication codes.