But I think if you look in the broad sense what a hash is, he is still correct. It’s just not a Sha256 hash but another kind of algorithm
-
Private keys is a unique identifier which can be used to secure your funds and must be kept secret or else your funds can be stolen. The public key is used to also generate a public key which can be shared with others to communicate with you.
-
the 2 use cases for public key cryptography are encryption and digital signatures.
- Your public key is for the world to know in order to receive messages. Your private key is a random number that enables you to conceal who you are. From your private key, a computer generates a random number in creating your public key. Your Private Key is the most important address you have. If someone gets your private key, they can see all the messages coming to you and they can also steal all of your cryptocurrencies.
- Encryption and Digital signatures
-
A private key is a personally held cryptographically generated key that is used to generate a cryptographically generated public key and digital signature. The public key is used to encrypt data that can only be decrypted by the private key that generated the public key. The public key can be sent to anyone on a public network in order to receive encrypted data from them. The digital signature is used to verify the sender’s private key by verifying if the digital signature and the public key of the sender correlate to the sender’s private key. Public keys and digital signatures cannot be used to find out the private key it was derived from.
-
Public keys are used to encrypt data that moves along an open public network. It is also used to transfer digital signatures to provide authenticity from the sender.
-
A private Key is generated and kept private this is then used to create a Public key shared to the world. When bob wants to send a message to Alice he signs the message with his private Key and Alice public key now Alice is the only one who can decrypt the message was signed with her public key as well as Bobs.
-
Private emails and Bitcoin addresses.
Public key cryptography is not hashing. Hashes are used to create fingerprints of data, don’t require a key and can’t be decrypted. Public key cryptography is used to encrypt/decrypt or digitally sign data.
The outputs might look similar, a seemingly random stream of bits but don’t represent the same thing.
-
Public key is used by others so they may be able to decrypt messages and private key is used for yourself to access said information. It can be also used as a way to sign a transaction.
-
Encryption as well as a digital signature.
- A private key is a set of numbers/letters (ideally random) that can be used to generate a public key. The private key should not be able to be inferred from the public key as the public key is used for distribution over a shared/open network for encryption of messages or as a receiving address for transactions. The private key is used to decrypt messages or verify validity of transactions.
- Either for encryption (of data/messages) or as a digital signature (verification of identification of messages or transactions to ensure integrity).
-
A public key is what you use to send and receive crypto. A private key is used to access the funds in the wallet.
-
Public key cryptography can be used for digital signatures and for encryption.
- We can think of this concept in two ways. First, a public key can be imagined as a sophisticated lockbox. Anyone can slip a message into the letter opening in the lockbox, but no one can read the message inside without first unlocking the box. The lock keeps the message from being read. The actual key that unlocks the lock on the lockbox is the private key of the individual who owns the box.
A second way to answer this question is to describe the private key like the chip on a credit card. The credit card reader at the supermarket receives the digital number from a credit card (the public key), but it needs the chip from the card to verify that the card is authentic and not a forged copy.
- Two ways public key cryptography can be used:
A- To encrypt a message so that only the receiving part can read it.
B- To prove that the author of the message is truly who the message says that it is.
Check the privacy course in the Academy and many others call it a hash as well, when speaking in a broad sense. It is basically some kind of a fingerprint as well. I also corrected many people in this forum that it is not a hash until I see many people calling it a hash + when I look up the definition of a hash. But off course, It is open to interpretation
1.Describe the concept of public and private key with your own words.
the private key is a random number generated by the computer, the public key is generated through the special formula using the private key, basically public key is derived from the private key. the public key is open to public and shared, but it has the special function, there is no possibility to go to private key from public key
- What 2 use-cases can public key cryptography be used for?
encryption and digital signatures.
encryption is used for example in cases if one person wants to send a private message on an open network to another person, so the person1 would encrypt the message by the public key of person2. the person2, who receives the message from person1 can open the message only by using his private key.
digital signature is used for the receiver of the message to verify from who the message was sent. for example the person1 who is sending the message to a person2 is signing the message using its private key. so the receiver (person2) then can verify that the signature was created by the private key that was used to generate persons1 public key.
- the concept of a public and private key is that a private key is generated when you use a cryptocurrency wallet such as a bitcoin wallet [Bitcoin Wallet —> Private key] and should only be view by you and no one else, and a public key is generated by your private key for others to to be able to see/send “bitcoin”.
- the 2 use cases for a public key cryptography are
1. Encryption
2. Digital Signatures
- A private key is a random number from which you can generate public key accessible to everyone in the world. In encryption, the private key can be used to decrypt messages encrypted with the public key. In digital signatures, the public key can be used to verify transactions signed with the private key. You can always generate your public key from a private key, but never the other way around. Private key is such a large number that it has never been generated before in the universe.
- Encryption and Digital Signatures.
You don’t use hashing functions to create public keys and its a different method altogether.
You don’t use a hash function to encrypt things. You use an encryption algorithm.
You don’t use an encryption algorithm to sign things. You use a signature algorithm.
1 a public key is accessible for everyone. when somebody produces a message it will be encrypted by the public key off the receiver before it will send to the receiver. the receiver can decrypt the message through his private key.
2 your Public key can encrypt a message before it is send and than decrypt through the private key or a receiver can verify a message through the digital signature and the public key off the sender.
1- Public and private keys are randomly generated values that can be used in wallets to encrypt and digitally sign information/transactions that will be sent over an open unsecure network.
2- Two major use cases for public key cryptography are: 1) Encryption: User A can encrypt and send a message to user B by encrypting the message using user B’s public key. Then user B can decrypt the message using their private key because it is linked to their public key.
2) Digital Signatures: User A can also digitally sign the message using their private key. User B can verify the message is sent from user A by checking the signature of the message along with the public key of user A because both the signature and the public key are derived from the private key.
1)A public key is a number that is generated by and unique to your private key. It is a way to encrypt information that can only be decrypted by the private key that it was generated from. When transferring value you could think of it as your Sort code and account number, people can deposit into your account/private key, but they have no access to it. The private key is a large randomly generated number that acts as an account/decryption tool/digital signature.
- The two cases that a public key can be used for are to receive secure private information that can only be read by the owner of the private key and to digitally sign/confirm, that a transaction has been sent by a specific private key.
-
Describe the concept of public and private key with your own words.
Its a key to share with others , its a msg encripted everybody can see but only you can read ans sign it . -
What 2 use-cases can public key cryptography be used for?
encryptation
digital signature
- Describe the concept of public and private key with your own words.
A public key is a key generated by the private key that is shareable with the public in order to participate and sign transactions without exposing sensitive data. A private key contains sensitive data that is used to unlock transactions once both addresses have signed.
- What 2 use-cases can public key cryptography be used for?
Public key cryptography can be used to associate you or a person person you know to a specific wallet and to encrypt the vulnerability of someone knowing your private key.