Homework on Public and Private Keys - Questions

[quote=“ivan, post:1, topic:8431”]
Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    private key is a random number in your computer. a public keys is derived from your private key. So somebody sends me a message this message will be encrypted with my public key. I can decrypt it with my private key.

  2. What 2 use-cases can public key cryptography be used for?
    Digital signatures for example sending bitcoins. Private key is a random number in my wallet, public key and a bitcoin address. You sent me an bitcoin. You will use my public key and sign it. I receive the bitcoin and decrypt because I use my privat key and know it is yours because you signed it.

public and private key encryption and decryption of messages sent over for example internet

  1. Your computer create a random password and make a complicated one sided function on it. The new number is your address.
  2. a. get money b. give money?
  1. Describe the concept of public and private key with your own words.

The concept of the two keys – public and private – derives from the need to send encrypted data from one address on a computer network to another address on the network. Creating both public and private keys ensures that one address can not only send data that won’t be seen by anyone else, but also confirms the identity of the sender within the information.

A private key can be randomly generated by a user, which will in turn generate a totally unique public key for that private key. As the name suggests, a public key is public and can be made so; issued to anyone anywhere without worry, as it is impossible to derive the private key from the public one. The private key on the other hand is the only key able to unlock the public key’s data and therefore securely kept by the one generating it. If this password is lost, there are no retracement steps – everything ever sent or received to that address is also lost with the private key.

Should an address wish to send data to a separate address without encrypting the message it can also do so. Other computers in the network can see the message and verify the source of it by way of the private key signature added by the sender.

  1. What 2 use-cases can public key cryptography be used for?

Public key cryptography can be used for encrypting data. The data can be encrypted so that it can be sent without others seeing it.

The second use is for digital signatures. This enables the sender and/or the receiver of the sent information to be identified using the private key.

1.Private key belong to you, and you alone. If you you lose your private key you lose the funds, or id someone else have it he she can take your Bitcoin. Your public key is available to anyone to see and is generated with the private key.

  1. Public-key cryptography can be used in digital signatures and encription.

1. Describe the concept of public and private key with your own words.
Public key is used to receive an encrypted data, the private key is used to decrypt the data in order to be able to use it.

2. What 2 use-cases can public key cryptography be used for?
can be used to receive data, can be used to verify digital signatures.

[quote=“ivan, post:1, topic:8431”]
Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    Answer: When a wallet adress is initiated, A private key, which is an encrypted random, one-way function in the form of an alphanumeric string or hash, is generated. From the private key, a public key which includes encryption, a digital signiture and a one-way function is also generated.

  2. What 2 use-cases can public key cryptography be used for?
    [/quote] Answer: The public key is used for transfering Bitcoin and other cryptocurrencies and can be used to receive and send; donations, payments, sign documents and more, as other applications are being built on this technology.

  1. Private key is a random computer generated sequence. Public key is obtained from private key using an encryption algorithm.
  2. You can send a message encrypted with the public key and he can be decrypted only using the private key. The sender signs the message using the private key and the receiver can verify that the message came from actual sender by checking the public key.
1 Like
**1. Describe the concept of public and private key with your own words.**

Public and private keys can offer a secure way of exchanging data through a network.
Having an algorithm that will generate a private key that only you must know and use. From that private key you can generate from the same algorithm your public key that you can share and use to generate an address to receive data. When someone uses your public key to encrypt a message or send a transaction to your address, you can only read or accept the transaction using your private key.

**2. What 2 use-cases can public key cryptography be used for?**

One of the uses of public key in cryptography is when you want to send a message to someone through a public network, you have to encrypt your message through the algorithm with his public key.
When he receives that message he can only read it if the private key that he posses generate the public key that the message was encrypted. This is called encryption.
The other use case is called digital signatures and with that you use the shared public key of the individual that you received a message that is also signed through the algorithm and his private key, creating a digital signature on the message. Using the algorithm and his public key you can compare if the public key and the signature were generated from his unique private key.

  1. Describe the concept of public and private key with your own words.
    The private key is generated when you create a wallet, and is the one that the only one should have it is you, the public key is the one you can send to someone to send you a message or bitcoin in this case.

  2. What 2 use-cases can public key cryptography be used for?
    To send encrypted messages and to send cryptocurrencies.

  1. Public key is used to encrypt sensitive information. Public key is visible to everyone. Private key is visible only to the owner. Private key is used to decrypt the public key
  2. Encryption and Digital signature
  1. A public key is created by a hash funktion out of a privat key wich can not be tracked backwards. Means, a public key can be given to anyone, the privat key should always kept as it names says PRIVAT…

  2. a. to verify myself when i sent a crypted msg.
    b. to give someone verified excess to a crypted msg.

  1. They are unique numbers. Public key is used for encrypting data and then private key decrypts it by using the public key. Public key is derived from the private key. It is impossible to figure out private key with public key.

  2. In encryption and digital signature.

Private key is created by the wallet/computer, a random number, and the public key is derived from that private key number. They are a pair in which the private key must be kept private and safe from prying eyes.

Public key cryptography is used to encrypt messages that are sent and/or in conjuction with the private key used to verify transactions.

  1. Private key is a random set of numbers that is like an “master-key” to your addresses. From the Private key you can generate a public key which you can share and with the Private key you can sign transactions and verify you own the public key.
  2. Digital signatures
    encryption
  1. Private key is generated by random numbers as for security reasons for the person who is using it. And a public key is generated from that private key numbers so it can be used for the public; it doesn’t need to be secret. Both are used for encryption and to decrypt the information through the İnternet for security reasons.

  2. Their 2 use cases are in cryptocurrency wallet addresses for encryption and in e mails as a digital signature.

  1. Describe the concept of public and private key with your own words.
    a private key is a stream of random data that is used to create public keys and to sign messages

  2. What 2 use-cases can public key cryptography be used for?
    it can be used for cryptocurrencies and also in private messaging applications

A private key is a randomly generated number that is used to qualify an owner of a message or transaction. This key is generated by ones computer or device used to store valuable info./goods. The owner of the private key is responsible for its safe keeping and is the only one that can open messages and or transactions addressed to him/her from known public key.

Two use case scenarios would be 1.) a digital signature sent from an entity for whom they would like you to confirm that it was in fact them whom sent the message. This private key can be qualified by the known public key in the recipients possession. 2.) Public key cryptography is used with Bitcoin. Your public key in known to the world and is used to send you Bitcoin funds for example. Your private key, which derived the known public key, is what is used to access the funds sent to your public key.

  1. Private key is the key to your wallet and gives you access to utxos associated with it. Public key is for everyone to see and is hashed from your private key. One could never guess the private key from your public key.
  2. identification/ data management/ biological data/communication
  1. A public key is derived from a private key and it is safe to hand out to everyone. The private key is only for yourself. It is infeasible to derive a private key from a public key.

  2. Encryption and digital signatures.

Private key random number. From this public key is generated and from this bitcoin address. The private key is used to sign a transaction, proves it’s from you. Public address is where bitcoin is sent. These keys are used in encryption and for digital signatures.