Describe the concept of public and private key with your own words.
The private key is used to generate your public key. When someone receives a message signed with your private key, they can be assured the message came from you. The reason for the assurance is that your message can be uniquely traced to you private key.
What 2 use-cases can public key cryptography be used for?
public key: a key that is linked to the private key only one way so that the private key cannot be hacked. it is visible to anybody and cannot be used to steal the funds.
private key: your personal key that can be used by anyone to send money if you don’t protect it.it is linked to the public key in one direction so that the public key cannot be linked back to the private key.
Sending cryptocurrency and auditing an entities finances.
Describe the concept of public and private key with your own words.
A private key is your mathematical function which can encrypt your data. When a Public key is produced it also uses the Private Key encryption information - so they act as a pair.
A Public key can then be provided to anyone who can use it to encrypt a message for you. Only you can then decrypt the message using your own Private Key.
What 2 use-cases can public key cryptography be used for?
Use Case 1 - then send encrypted messages as discussed above.
Use Case 2 - Can be used for digital signatures so you can verify who sent a message or transaction. You would use a Private Key to sign a message and then the Public Key can be used to verify you were the sender. Note the message does not need to be encrypted.
Describe the concept of public and private key with your own words.
Private key is a secret key (random number) that is meant to be only known by the owner of the key.
Public key is a key derived from a private key using a mathematical formula. Public keys are shared publicly.
What 2 use-cases can public key cryptography be used for?
Encryption - I can publish a public key, which others can use to encrypt messages that only I can open using my private key to decrypt them.
Digital Signatures - I can sign a message with my private key and others can verify that it corresponds to the public key that I have published.
Yes, You can use this cryptography for anything you want. It’s not only for bitcoin. It just allows you to send messages to other people using this cryptography. And you can proof that it was sended from this particular sender without reveiling the message. Many messaging apps use this kind of encryption as well. On the darknet, they use pgp keys to communicate with each other. Like the Public key is the mailbox and the private key is to be able to read the message and used to send messages to other mailboxes (digital signature)
Public key can be seen by anyone, it is like your address for receiving. Private Key is only for the holder, must kept secret and also safe. You can create Public key from Private Key but not vice versa.
Private keys are large, randomly generated set of numbers and letters. Public keys are derived from private keys using mathematical formula. There is no way that you can obtain private key from public key. It only goes one way (Private key -> Public key) Private key is something you must keep private, and public key is for everyone to see.
a) Encrypting messages. Lets say Boris wants to receive a massage form Ana. Boris generates random large private key and derives a public key out of it. He sends the public key to Ana and she encrypts the message with that public key. She then sends the message to Boris. This massage can only be decrypted with the private key that only Boris has.
b.) Digital Signature
It is used in bticoin, where each transaction is signed with the private key. The reciever (or the network) can identify if that was really you who sent the transaction by using public key to verify the signature with private key.
Describe the concept of public and private key with your own words. A private key is chosen based on as random data as possible to be unique. Then a public key is derived from the private key such as to allow a message encrypted by the public key to be decrypted by the private key. This is asymmetric so the private key is not shared.
What 2 use-cases can public key cryptography be used for? Public key cryptography is used for transmitting encrypted data securely or for signing a hash of the data to provided authenticity of the data.
A private key is a string of numbers that generate a public key.
A private keys allow a user to sign a transaction or message and this can be verified by others using it’s public key.
Public key: Derived from the private key, the public key is a way any other people can identify your private key account without being able to access the private key itself.
Private Key: The original hexidecimal name of your account. Knowing it provides full access to the account.
Public key use cases:
a) Encryption - transferring data where it can only be seen if you have the key
b) Signature - for the reciver to validate the origin
public key- Derived from the private key. Used to encrypt messages on the chain. The private key is used to decrypt the message sent to the public key. Cannot use public key to figure out the private key.
private key- A randomly generated number used to generate the public key. Private key is used to decrypt messages sent to the public key. It is similar to verifying the message.
Public key cryptography can be used to verify that transactions are going to the right place. It can also be used to encrypt information and ensure that only the intended recipient receives the transaction.
Public Key is your contact detail without which No once can interact with you in the form of sending any kind of physical or digital message. Now Private Keys are like a password with which you access the content of the message.
Private key is a random number generated by your computer (a number so large the chances of another computer generating the same number is practically zero), through a mathmatical algorithm, a public key is generated. The public key can be broadcast to everyone and there is no way to derive the private key from the public key. Public keys can be used to encrypt a message that can only be decrypted using the private key. This can keep messages and data private from external parties.
Public key cryptography can be used to encrpyt messages that are being sent from user A to user B, user A takes user B’s public key and encrypts the message they want to send - user B can then use their private key to decrypt the message recieved. Another use case is digitial signatures where a message can be signed to verify that the message geniuenely came from the sender.
Another use case is digital signatures where you use the private key to sign a message (transaction on Bitcoin) and others can verify it using your public key
The private key is a randomly generated number, it needs to be kept secure.
The public key is a number generated from the private key using a function, it can be made public.
Public keys are used in encryption and digital signatures.