- Your public key is like your encrypted account number and your private key is your digital signature
- To send and receive bitcoin
-
public and private keys are used for identity and security reasons. A private key is generated randomly and then from that private key a public key is generated which can be shared with anyone, but the private key cannot be derived from that public key making it secure.
-
sending and receiving cryptos
[quote=âivan, post:1, topic:8431, full:trueâ]
Homework on Public and Private Keys - Questions
- Describe the concept of public and private key with your own words.
The public key is generated from the private key, the private allows the owner to prove that they sent (signed ) a message or can be used to open a message encrypted by the public key - What 2 use-cases can public key cryptography be used for?
Encryption and Digital Signatures
-
Public and private keys are cryptographic tools that can be used for security and identification purposes. After creating a private key, a series of random values, you can hash it and use the results as you public key. The public key can be displayed publicly and is linked to your private key, proving a connection of ownership of assets of information connected to that private key, but there is no way to decipher your private and your public key alone.
-
Encryption and digital signatures
Public key is your key shared with the public. A private key belongs to you only and allows you to decrypt messages and is key to sign messages, a digital signature.
- A private key, a random secret number, signs and a public key, which is public to everyone, verifies.
- Public key cryptography can be used to verify a signature and decrypt a secret message.
-
Private key you keep it secret keep it safe only for you. Public key is derived from the private key and can be revealed to the public.
-
For verifying who signed a message and encryption.
How is the information encoded?
Both are digital signatures, public key cryptography can also be used for encryption
-
Describe the concept of public and private key with your own words.
By creating a private key, you essentially have a unique, randomly generated key that you can use to then generate a public key for anyone to use, that only you can decrypt since you are the only one with access to your private key. -
What 2 use-cases can public key cryptography be used for?
Public key cryptography case uses include encryption (of messages, etc) and digital signatures, to prove that this message was sent via your public key but signed by your private key to verifying it has come from you.
-
A public key is generated from a private key. A private key are just random numbers, that represent the property of that account. The private key is use for signing transaction and the public key to encrypt data, where only the holder of the private key can decrypt.
-
Digital signing to verify a person and encryption, where only decryption with the right private key is possible.
-
Public keys allow a user to send information to another party in an encrypted manner. The receiver uses the private key to decode the information. The public key is generated by the private key which acts as one way encryption.
-
Encryption and verification or digital signatures.
- The public key is the hash functions generated by the private key witch can be used to be verified by others to see if you send data to them.
The private key is the hash function generated by your computer from a string of words and numbers used to protect yourself from someone else who is trying to spy, steal your data. It can also pe used when you receive data to confirm that it is you. - It is used to create a bitcoin address,
it is used to verify that you are the one who sent data (digital signature)
1. Describe the concept of public and private key with your own words.
-
Because there is no central entity that keeps track of all the BTC wallets there are in BTC, instead, each wallet is based on a private and public pair.
-
Private key - It should be known only to the creator of the private key. If someone else has it, he has access to your funds. Itâs something like the password to your e-mail.
-
Public key - this is the key, which is public and known to everyone. If someone wants to send you some BTC, he will use the public key. Itâs something like your e-mail address. The reciver then will be able to access this information with his private key. There is no way for someone to find out your private key through your public key
2. What 2 use-cases can public key cryptography be used for?
- Encription and Digital signatures.
Bitcoin address is just a hash of the public key. Besides digital signatures you can also use public key cryptography for encryption
- Describe the concept of public and private key with your own words.
A Public Key is a key generated by hashing a private key, so the public key can be exposed anywhere without revealing the message. Public Keys can also be used to encrypt messages that only the private key will be able to decrypt.
- What 2 use-cases can public key cryptography be used for?
A Public Key can be used to send encrypted messages through a Public or open network.
Another use is for âdigital signaturesâ to ensure the origin or identity of the sender of a message is in fact the real sender of the message.
- Describe the concept of public and private key with your own words.
You generate a private key with a mathematical formula that is very randomized that it will take multiple lifetimes and even longer to guess if secured properly by not sharing it anywhere. That private key will then generate a public key for you to share publicly anywhere so people can send you bitcoin by encrypting their key with your public key. Because the public key is generated from the private key, it is impossible to do any type of reverse algorithms to find what the private key is. And then you will decrypt the key with your private key.
- What 2 use-cases can public key cryptography be used for?
Public Key cryptography can be used for receiving money or receiving messages.
- A private key is randomly generated by a users pc, the public key is generated using the SHA-256 protocol from the private key, it is impossible to âguessâ the private key only knowing the public key. The private key basically confirms ownership of the public key.
- It can be used for Encrypting messages and for digital signatures (proof of ownership such as funds or digital assets).
1.) Private and public keys are random generated numbers, with the private key being secret and only seen by the owner, it can sign data and generate a public key. The public key can be seen others and the address that others use to send transactions to, the public key can be derived from a private but cannot derive a private key itself.
- Digital signatures and encrypting message are 2 use cases
Public key is not a hash of the private key. To derive public keys the elliptic curve function is used.