Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    Public key is used to encrypt datas, The private keys decrypts it.

  2. What 2 use-cases can public key cryptography be used for?
    i. Authentication
    ii. Bitcoin
    iii. SSH

1 Like

You can also use to encrypt your message when you are using an open or unsecured network.

2 Likes
  1. the private key is my digital identity and integrity while the public key is the gateway to verify my digital identity.
  2. to encript messages and to sign transactions.
2 Likes
  1. Describe the concept of public and private key with your own words.
    A public key functions as an address that can be shared widely for users to send messages or transactions to that address; it is derived from the owner’s private key via a one-way function so that the private key remains private only to the owner to retrieve the messages, or use their key for a digital signature proving authenticity/ identity verification.
  2. What 2 use-cases can public key cryptography be used for?
    a) public key cryptography can be used for sending and receiving encrypted messages
    b) private key can be used for digital signature/authentication
2 Likes
  1. Describe the concept of public and private key with your own words.
    It’s a mathematic method of transmitting encrypted data securely. The message receiver (Bob) uses their private key to generate a public key (shared freely with the public), and then a message sender (Alice) uses that public key to encrypt a message. The message can only be decrypted by the private key (Bob). If Bob wishes to send a message to Alice, he’ll have to obtain her public key. Thus, a single pair of keys allow only for data to transmitted securely to the pair owner.

  2. What 2 use-cases can public key cryptography be used for?
    Message encryption and digital signatures.

2 Likes
  1. public key is more or less your adress where everyone can see and can send you bitcoin
    the private key generates the public key and is not calculatable viseversa from the public key and is needed to sing transactions

  2. To have a adress that people can send somone a message, coins or other data. and to enrypt the data and make it for the other person possible to open the message if he has the private key related to the public key the message is send to

2 Likes
  1. Describe the concept of public and private key with your own words.
    They provide the way of securing messages through public networks with spectators.
  2. What 2 use-cases can public key cryptography be used for?
    Encoding and signature
1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of the public and private keys in your own words.
  • Our original message or digital money can only be opened for transactions using our own private keys generated in the blockchain. The public key can be viewed and read by the public or outside people in the blockchain network.
  1. What 2 use-cases can public-key cryptography be used for?
    The 2 use-cases for public-key cryptography are digital signature and encryption.
1 Like
  1. Public and private keys are a pair of keys that are used for encryption and decryption. The public key is used for encryption and is as the name implies, public. Data encrypted with a public key is only decryptable via the private key that was used to generate its paired public key. This is why private keys need to be kept private.
  2. Besides encryption the other use case is as a digital signature to determine a) the integrity of data or b) to verify the identity of the sender of data.
1 Like
  1. Private and public keys are mathematical algorithms used to identify transactions and verify who has sent them. They are a one-way function, public keys can go to private but private cannot go to public keys due to the security nature of its algorithm.

  2. Case 1: Encryption
    1) Person 1 sends message to person 2 with their public key(message
    is encrypted)
    2) Person 2 can decrypt, unlock message with their personal private
    key to read it

    Case 2: Digital Signature
    1) Person 1’s uses private key to sign and sends message to
    person 2
    2) Person 2 uses their private key and matches it with person 1’s
    public key to mathematical verify that they were the original
    sender.

1 Like

Private key can be generated with any numbers, public key can only be generated with private key, and its only one way, you cannot generate private key from public.

Public key cryptography can be used for signatures and for encryptions.

1 Like
  1. As simple as an explanation as I can give would be using our mobile/cell phones. Your phone number is the public key in which people can send you a message. Now, the only way to view that message would be the code/password/fingerprint/facial recognition security that you have set for your mobile phone. The only difference is that a private key is far more difficult to crack than everyone’s passwords etc. It more ties to a fingerprint in that no 2 people in the world have the exact same fingerprints.

  2. Encryption and Signatures are the 2 use cases for Pub Key Cryptography.

Sending and receiving secret messages which are encrypted using your public key and decrypting it using your private key.

Signing transactions so that the network knows a certain individual or group (if multisig) have signed and authorised such a transaction.

1 Like
  1. A private key is a randomly generated number that is to be kept secret. A public key is derived from the private key using a 1-way function so you can not ascertain a private key from the relevant public key.

  2. Encryption & digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.

Public key is for encryption.
Private key is for decryption.
Sender encrypts a message with the receiver’s public key.
The receiver decrypts the encryption and read the message from the sender.

  1. What 2 use-cases can public key cryptography be used for?

digital signature and encryption

1 Like

Describe the concept of public and private key with your own words.
Allows information to be sent one way from one participant to another securely eventhough there are others looking…a secret message/information that no one understands.

To do so, first the participant takes the private key and generates a public key. Second, the participant or anyone given the public key takes the message/information and encrypts it so nobody can understand it without the private key. Then the holder of the private key uses it to unencrypt the message/information. Or the private key holder generates a digital signature that anyone given the public key can use to verify that the holder is authentically the private key holder.

What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures to verify that you are who you say you are (authenticity). Crypto typically uses it for digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    [and] Public and private key pair is used in crypto world for digitally sign transaction, so it is known if the right owner has signed the transaction. Private-key is randomly generated value from which a public key is generated. This public-key serves as unique address for any user in cryptoworld. there is no way to derive private-key from public-key. so it is fully secure.
  2. What 2 use-cases can public key cryptography be used for?
    [and] Digitally signature and Encryption
1 Like
  1. Private keys are used to protect ones identity so to speak, while a public key is used to identify different users on a network and to encrypt data. The private key is used to decrypt data and is kept secret.

  2. private and public keys are used for purchasing crypto and having the transaction recorded on the blockchain. The keys are also used for sending and receiving messages and signing electronic documents

1 Like
  1. Private Key is a large random number generated by the system and with that private key we can derive the Public Key. This private and public keys are used in encrypting the transaction or providing the digital signature to a transaction
  2. Encryption and Digital signature of the transaction are the 2 use-cases
1 Like
  1. Public keys can be shared with anyone. Each public key comes paired with an unique private key. A private key makes sure only you make it through.

  2. Public keys can be used for encryptions and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.

It’s a pair of key, where the private key is generated randomly and the public key is generated from the private key through a one way function, meaning is not possible to find the private key from the public.
Messages encrypted with the public key can be de-crypted with the private key and message signed withe the private key can be authenticated with the public key

  1. What 2 use-cases can public key cryptography be used for?
  • encryption. Message is encrypted with the public key and only the private key owner can de-crypt it
  • digital signature - message is signed with the private key and everyone can verify through the public key who the sender is

This two can be combined

1 Like