- Describe the concept of public and private key with your own words.
Public and private key pairs are an encrypted set of numbers used as keys to sign and encrypt information - What 2 use-cases can public key cryptography be used for?
They are used for encryption of data only the matching key can decode and to verify the authentication of the sender of data
- a private key is a random number - it has to be kept very secret. With the private key one can create a public key, which can be shared with whomever you want.You can send an encyrpted message to the public key of the receiver and the receiver decrypts the message with his private key. The same goes for digital signature - when I want to check if the message really comes from a specific sender, I have to verify if the signature (signed with the private key) corresponds to the public key of the sender.
- for encryption and digital signatures
- Describe the concept of public and private key with your own words.
A. Private keys are unique and hidden. For instance, your private key allows access to your secure information and transactions. You and only you should have knowledge of it. Your private key generates a digital signature for all of your transactions. A public key masks the private key and it is what is seen and used by others to verify your identity and send/receive data or transactions. The public key acts as a buffer to allow the sending/receiving of information and transactions without compromising the identity and security of the involved parties.
- What 2 use-cases can public key cryptography be used for?
A. Public key cryptography can be used for the encryption of data and transactions as well as generating digital signatures.
The private key is your private address to your crypto wallet ( Never give access to anyone) This number is a randomly generated number used when signing a send transaction.
A public key is a link to your private key that has been derived from your private key by Elliptic Curve Cryptography which is a 1 way algorithm meaning a private key cannot be derived by using the public key, the public key can be used to receive bitcoin & is safe to share .
- What 2 use-cases can public key cryptography be used for?
encryptions & digital signatures
-
Describe the concept of public and private key with your own words.
The `public key encrypts information and the private key decrypts the information -
What 2 use-cases can public key cryptography be used for?
Encryption and Digital Signatures
- A public key is shared with the world which identifies you as the source of a message or the address of a wallet that you own to which others can send money. The public key is created from a random number using a hashing function. The random number is a private key that is never shared with anyone.
- Use cases include digital signatures for verifying the source of information or digital addresses to which information is sent.
Public key is a random number predicated upon the private key random number. The private key basically produces the public key. The public key is available for antone to see and use to send message, but the private key is totally private. Keep it that way.
2 use cases:
Crypography to send encrypted messages
Digital signatures
- private key is a random number generated by the computer, which you must keep secret, and the public key is derived from this private key, and together they are used to encrypt and decrypt sensitive information
- encryption and digital signatures
- Public Key is to show to the world, to recieve Bitcoins
Private Key is to sign transaction and to keep secret. - The Public Key is used to encrypte a message or by the reciepiant of the transaction that was signed with the digital Signature.
Public keys are derived using the elliptic curve
You can’t really send anything using keys, you can sign a transaction and send it over the internet. You can also encrypt a message, that would be the other use case.
- public is for paying in (public), private is for spending out (private)
2.digital signing and crypto
1.) Private and public keys are used for 2 reasons. for encryption and for making a digital signature. Private Keys are always the starting point and they can always create a public key. the private key is something you should always keep secret and well memorized or saved somewhere. while the public key will be shared with the world. no one can have the same Private key it is completely impossible.
In Encryption, we use the public key of the receiver and the receiver uses his private key to read our message.
in Digital Signature. we send a message with our private key but for the receiver, he will receive our public key and will be able to know it is us.
2.) Encryption of messages and Digital Signatures in Blockchain/Bitcoin
Crypto is utilizing digital signatures, that’s what it means to sign a transaction. Another use case is encryption
1. Describe the concept of public and private key with your own words.
public and private keys are paired related keys. Private keys generate public keys, its a one way function. Public key can be shared publicly but private key are known only to the owner.
2. What 2 use-cases can public key cryptography be used for?
Encryption and Digital signatures.
-
Private keys are generated randomly by your computer and are used to generate your wallet. This is what you don’t want no one to know, otherwise they could use it to take your crypto. This is what some refer to as the seed phrases for your wallet where you are given usually 12 random words to keep as your private key. Public key gets from your private key, and this is what is used in order to receive cryptos. This is what you can give to everyone.
-
The two use-cases that can be used for public cryptography are:
a. Encryption- to send encrypted messages to another user.
b. Digital Signatures- this is the case where it would be used in your crypto wallet to keep it secure so no one is able to hack it.
-
private key is randomly generated number that is known only to me and nobody else. public is the number that is created based on my private and can be used by others to communicate woth me
-
encryption and digital signature
- The public key is cryptographically derived from the privet key. So you can share the public key whit anyone you like. But the only way to see what is in the public key/address is to open it whit the privet key.
- To receive funds or messages around the world. Verifying identity.
1.- we generate by a computer random numbers (private key and public key).
- Through a function we generate a public key, this one is connected to the private key by a mathematical connection through the eliptic curve.
- Through our private key, we generate a digital unique signature not to expose our private key.
- Public key.- through here, we generate an address hashing twice the public key, this is the hash version of the public key.
So the private key is our personal authorization to send funds by the digital signature and the public key is the shown address which is connected to the private key.
2.- To encrypt the messages we send and the digital signature + hash public key can be verify by the nodes to add to the blockchain.
1)private key = secret key you have to take care of. It`s a large number noone is able to guess. Once you have your private key you are able to generate a public key everyone is able to see. Within a transaction you use your private key to sign this transaction. So the recipient of the transaction is only able to see your public key. The public key is related to your private key because its been generated from it. bitcoin address is generated from the public key. a transaction not signed with private key is worthless, so the owner of the private key = the owner of the bitcoin address generated from private and public key.
- encrypting messages
digital signature
-
A large random number is generated and this is the private key. Using that number, a formula is used to generate a public key (another large number). The public key can then be used to perhaps encrypt a message that can only be decrypted by using the private key.
-
a) encryption, b) digital signatures