Homework on Public and Private Keys - Questions

1.Thanks to it users can encrypt and decrypt messages/transactions between each other (one way) :arrow_up: and be sure of the authenticity of the message sender.
2. Encryption and digital signature.

1 Like
  1. Describe the concept of public and private key with your own words.
    The public and private keys are used for encryption and digital signatures. The private key is a large random number and the public key is derived from the private key. The public key can be shared openly on the internet without worry of the private key being determined to receive transactions or encrypt data to the public key recipient. The private key is used to digitally sign transactions and decrypt data.

  2. What 2 use-cases can public key cryptography be used for?
    Public key cryptography can be used to encrypt data for the public key recipient. Also public keys are used for digital signatures, which verify the origin of the transaction or message signed.

1 Like

1 - Describe the concept of public and private keys with your own words.

  • The private key is a random number and the public key is generated from the private key. There is no way to find out the private key from the public. The public key is shared, for the world to see. The private key shouldn’t be shared. The private key is used to sign and decrypt messages. The public key is used to validate the signature and encrypt messages.

2 - What 2 use-cases can public key cryptography be used for?

  • They are used to encrypt and sign messages. To protect a message’s contents, you encrypt it with a public key and then decrypt it with the corresponding private key. To ensure the identity and integrity of the message, you sign the message with your private key and then the others can verify the signature with your public key
1 Like

1.Private key is a random unique number created in your system which is used to encrypt a data or to digital sign a data.Public key is derived from the private using a mathematical formula.
2.Public key is used to encrypt a data send to the person or verify the data send by the person.

1 Like
  1. The private key has a secret number that allows bitcoin to be unlocked and sent .It is used to to sign transactions to spend the funds. Each private key has a unique signature that authorizes the owner’s transaction.
    Private key = UNLOCK and SEND

The public key is used for receiving funds. When bitcoin is being spent, the owner presents the public key and a signature (different every time but produced with the private key) in a transaction to send the bitcoin.
Public key = LOCK and RECEIVE

  1. Public key crytography uses a pair of keys to encrypt and decrypt data to prevent unauthorized access or use. It assures the confidentiality, authenticity and non abuse of electronic communications and data storage.
  1. Private key = used to sign transactions to spend the funds
    Public Key to receive funds

  2. Two uses or cases of public key cartography
    encrypt plaintext and to verify a digital signature

1 Like

1.a private key is a random generated number by a computer that acts like your fingerprint and is kept secret.the public key is derived from this by a function and is used to share openly a connection to this private key.
2.to be used as digital signature
for encryption

1 Like
  1. The private key is essentially a large and random number generated by your computer, while your public key is a variation of your private key generated by a formula. As the names suggest a private key is kept secret at all costs while a public key is shared for everyone to see.

2 Number 1. Encryption: encryption is where if you want to send a private message but on a public network (eg. Twitter) you can take the message, encrypt the message using your sendee’s (person you want to send too) public key so only you and the person with the private key that was USED to make the public key can see it. To everyone else this just looks like gibberish. This is useful but isn’t used as much in crypto as the next use case.

Number 2. Digital signatures: The concept behind digital signatures is essentially verifying the person who sent you a message. Using your private key to send someone a message and signing it with the private key using an equation. Allowing the person to verify that ___ did send the message.

1 Like

1 - A private key is a kind of security key made up of a series of cryptographically generated random numbers that are almost impossible to crack. This key belongs only to the owner of the cryptocurrencies and is the way that he has to protect them and verify that they are his.
A public key is something similar to a bank account number. Unlike the private key, this address can be had by anyone, that is, you can give it to anyone you want to send you money, without running the risk of being “stolen” or scammed, thanks to the fact that there are private keys and digital signatures, which are necessary to confirm the authenticity of the transaction.
Its unidirectional so you can know the public key through yout private key, but no the other way arround. Its mathematically impossible.
2 - You can use it on Encryption and digital signatures

1 Like
  1. Describe the concept of public and private key with your own words. The public key which is generated/hashed from the private key will encrypt data that is sent as a message/transaction and only the person with the private key can decrypt it or it can verify the sender of the data/transaction from the private key signature.
  2. What 2 use-cases can public key cryptography be used for? The public key can be used for encryption of data and as a digital signature.
1 Like

Describe the concept of public and private key with your own words.

  • Public key is for the world to see and use.
  • You can not derive the private key from the public key.
  • Private key can be used to either decrypt a message that was encrypted using its public key or to sign a message.

What 2 use-cases can public key cryptography be used for?

1. for encryption

  • Uses private key and public key (derived from private key)
  • Public key is for the world to see. Any one can encrypt a message using the public key and only the person with the private key can decrypt the message.

2. for digital signatures

  • used to identify yourself, integrity (verify the sender is - who they say they are)
  • mechanism: Sender of message creates private key. Uses private key to sign the message (message itself doesn’t need to be encrypted). When recipient receives the message they can use the senders public key to verify that the message was really send by the expected sender.
2 Likes
  1. Public and private keys are used to encrypt and decrypt data that is transmitted over the internet. An entity or individual can create a private key, from this private key a public key is dervied. This is a one way function, you cannot determine a private key using a public key. The public key can then be used to encrypt data that is sent to the owner of the public key. The owner of the public key can then decrypt the data using the private key. The private key should be kept safe, as only the individual that has access to the private key can decrypt the data.

  2. a) Encryption, for example the encryption of data sent over an unsecured network
    b) Digital signatures, used in cryptocurrency, to verify that you are the owner of the cryptocurrency you are sending

1 Like
  1. A private is a random number which is unique generated by a computer and it’s for a personal used. It can’s be shared to anyone and should keep it in a safe place so that no one can steal it. When a message it sent to someone then it should be digitally signed to confirm that the right person has send the message to the right person so the private is used for signing the message which is possible to the private key holder.
    Public key is generated through private key so through public key no one can get access to the private key. It’s for public and can be shared to everyone.

  2. The first use- case is for encrypting a message and the second use-case is for signing digitally of a bitcoin transaction.

1 Like
  1. Describe the concept of public and private key with your own words.
    private key: Is what my computer would generate for my safe keeping. I only know this private key it’s not shared with anyone.
    public key:
    a public key is also generated from my computer to encrypt my private key, it is used for sending or receiving, to verify its authenticity, it’s a key that encrypts your private key. A public key can be used as the word states publicly. These processes are one directional , from private to public not public to private.

  2. What 2 use-cases can public key cryptography be used for?
    -Encryption of messages and for Digital signatures, receiving and sending funds.

1 Like
  1. The private key is a set of numbers that is used to send private messages to someone else. This message is sent to the other party, that party can then access the message with the private key. If they use the public key instead. The message will look like gibberish.
  2. The first is sending messages with a public key and decrypting it with a private key. The second use-case is using a private key as a signature, which is done by checking the signature with a public key.
2 Likes
  1. Describe the concept of public and private key with your own words.

Public and private key pairs are tools used for digital cryptography. A Private key is a large random number generated by a computer. The key is meant to be kept secret. The public key can be shared with anyone and is mathematically derived from the private key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption:

To send an encrypted message, the message is encrypted with the public key of the recipient. This renders the message unreadable until it is decrypted with a private key. The only private key which can decrypt the message is the corresponding private key of the public key which was originally used to encrypt it.

Digital Signature

A message or transaction is signed with the private key of the sender. All recipients can confirm who the sender was by checking against the sender’s public key.

1 Like
  1. Public and private keys are used to facilitate encrypted transactions via Blockchain networks. Private keys are secure keys, known only by the user, and are used to generate public keys which are shared with everyone throughout the network to initiate transactions between users.

  2. Encryption and Digital Signatures

1 Like

Homework - Public & Private Key Cryptography

A private key a a string of random numbers that can be used to decrypt encrypted messages AND digitally sign messages. A public key is derived from a private key and can be used to encrypt messages that can only be read by using the private key AND verify the signature of messages signed with the private key to confirm the creator.

The signing of digital messages is what enables cryptocurrency wallets to work. You spend coins from your wallet by signing a transaction with your private key. This ensures you are the one initiating the transaction.

Public key cryptography can be used to (1) encrypt messages so they can be securely transmitted over public networks and (2) sign messages so the creator of the message can be verified.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private Key is the users random set of number which is used to derive the Public Key, you cannot use the public key to derive the private key
  2. What 2 use-cases can public key cryptography be used for? Encryption and Digital Signatures
1 Like
  1. They are used to manage identity and security and also when used together they can encrypt and decrypt a message.

  2. For Encrypting & Digital signatures

1 Like