- A random number generator will come up with 2 unique combinations of digits and letters, a public and private key - this creates a dynamic relationship in which you need one to access/verify the other.
- Encryption and Digital Signatures are the 2 use cases for public key cryptography.
- The concept of public and private key is having the ability to send private information but itâs coded and only the intended recipient can decode it.
- Sending information/money
-
Describe the concept of public and private key with you own words.
A private key is a random string of numbers and letters that only you know and should never give to anyone else. A public key is derived from the private key through a formula and can be shared with the public. It is impossible to figure out the private key from knowing the private key. -
What 2 use-cases can public key cryptography be used for?
Encrypting a message and signing a transaction.
1.Private key is a random number that noone else has generated so far and public key is kind of a hashed value of it, so that you can derive from the private key.
2. Public key cryptography is used for encryption and digital signitures. Your public key is used by the recipient to verify that the message comes from you (this is the digital signiture use case), and you use someone elseâs public key to encrypt the message that you are sending to him/her (encryption use case).
Describe the concept of public and private key with your own words.
The private key generated by random numbers,private key is secret key and the owner have the access to it
.What 2 use-cases can public key cryptography be used for?
the two cases are encryption and digital signatures.
-
Public and private key is like a pathway in which the holder of the private key can send and receive information through his or her public key. This is a one way information pathway where the recipients of the public key have no access to the private key. This differs from say a checking account at a bank where you bank account is essentially your private key that if disclosed could provide access to your funds with just a couple of additional essential keys, i.e. government I.D. Drivers license, home address.
-
Public key cryptography can be used for encrypting messages from one person to another and also for verifying the identification of the source of the information the is received.
Describe the concept of public and private key with your own words.
The keypair is a way to mathematically identify the signer of a transaction, email, document, etc. or to be able to encrypt/decrypt some data by a specific entity.
What 2 use-cases can public key cryptography be used for?
- Encryption
- Digital Signature
- Describe the concept of public and private key with your own words.
Private key is generated set of numbers which only the key holder has access to. Public key is a generated from the private key which everyone can see and communicate with - What 2 use-cases can public key cryptography be used for?
Transferring sensitive encrypted information or transferring digital currency from one party to another within the blockchain
-
Public and private keys are generated in bitcoin cryptography to sign digital signatures. Private key is randomly generated key which hashes public key and bitcoin address. It ultimately is layers of impenetrable security.
-
Used for digital signatures and sending/receiving funds.
1.) Describe the concept of public and private key with your own words. Your private key generates your public key. The public key is seen by everyone and is used to encrypt information, that will be decrypted by your private key.
2.) What 2 use-cases can public key cryptography be used for? Encryption and Digital signatures.
-
Describe the concept of public and private key with your own words. Pubic Key is the one who anyone can see and guarantee that came from someone that can decrypt with their own Private Key
-
What 2 use-cases can public key cryptography be used for?
Encrypt messages (this to guarantee that no one can read your message on a public network)
Digital Signs (this guarantee your identity)
- Describe the concept of public and private key with your own words.
A private key is randomly generated by the computer according to a mathematical formula. Then a public key is generated based on the private key (a one way street). You can always get a public key from a private key but you can never derive a private key from a public key. The private key is needed to decrypt or sign anything associated with the public key.
- What 2 use-cases can public key cryptography be used for?
Messaging and Digital Signatures. In the messaging someone knows your public key (anyone can know it) and sends an encrypted message that can only be decoded with the private key.
In Digital signatures no transaction can take place using the public key unless it is signed by the private key. Thus if you have access to the private key you can sign off on any transaction you want.
Puclic key purposed is to othersz validate iether my encripted messages or identity, private key is wath only i can use to sign encript or transactions.
To read encrypted messages or to verify identities
-
Public key encrypts data and allows for verification of where it came from. private key decrypts the data after it has been sent in a transaction.
-
can be used to send encrypted information to someone else and as a digital signature so the recipient can verify that you actually sent the data
- A private key is a random large number generated by your computer to be able to sign transactions. From this number a public key is generated, and itâs for everyone to see. From this public key you create a Bitcoin adress.
- Encryption and digital signatures.
- Describe the concept of public and private key with your own words.
Public Key is to encrypt messages which you want to send. Private key is to decrypt messages which are encrypted with the public key. So if i want to communicate with someone we both share our public keys so that we can encrypt messages which the other member can decrypt with their private key. And if the message was not encrypted with the correct public key you can not decrypt it with your corresponding private key. - What 2 use-cases can public key cryptography be used for?
Safe messaging. VPN connection, proof of something
- Describe the concept of public and private key with your own words. Private key is the input to the hash function. public key is the output of the hash function
- What 2 use-cases can public key cryptography be used for? signatures and encryption like direct message in a public forum.
- A private key is like a sophisticated password that is randomly generated that has the ability to generate a username, i.e. public key. This username/public key cannot be used to figure out what the private key/password is.
- Continuing with that metaphor, you can send someone an encrypted message if you have their public key/username, and they can only read it if they have their private key/password. Also, you can generate from your own private key, a signature that will prove your identity when sending a message.
Public keys are not derived using hash functions but using the elliptic curve function
[quote=âivan, post:1, topic:8431, full:trueâ]
Homework on Public and Private Keys - Questions
-
Describe the concept of public and private key with your own words.
Public key is the address that is shared safely with the public. This key (address) can be shared across social media or any other digital platform to send information to be (message/tokens / bitcoin) etc. The Public key is generated from the Private key and is mathematically linked together. However, it is not possible to figure out the private key from accessing the public key. If someone accesses your private key (address) they can access all information sent to you as well as your bitcoin and send it to themselves - hence the phrase, âNot your wallettâ not your bitcoinâ. -
What 2 use-cases can public-key cryptography be used for?
(1) Encryption and (2) Digital Signatures
- Encryption enables private communication across an unsecured network.
- Digital Signatures verify who sent you the message by validating the signature signed to the message was derived from the same Private key as the Public key theyâve shared publicly.