Homework on Public and Private Keys - Questions

A private key is a random number that is used to generate a public key. The private key digitally signs the transaction and the public key verifies the signature.

  1. Encryption 2. Digital Signatures
1 Like
  1. Public and private keys are almost like an extremely secure username and password. Your public key is used sort of like a username to share with everyone so they can contact or make transactions with you. Your private key like a password should be kept only to you and is what is needed to access those messages and transactions in order to view and complete them.

  2. Encryption and digital signatures are the two use cases of public and private key cryptography. Encryption for sending secretive messages you don’t want anyone to see. Digital signatures to confirm your identity to others so you know you are getting what you got from who you think it is.

1 Like
  1. Public keys are used in a way that the world can know it but the information that is valuable is encrypted. The private key is a random number that only the owner should know and is used to decrypt the public keys valuable information.

  2. The 2 use-cases are encryption and digital signatures.

1 Like
  1. Private key is a very large random number generated by a computer that is used to create a public key derived from it. The former decrypts and must be kept secret and safe and the later is the one used for encrypting messages and can be shared with everyone.
  2. Encryption and Digital Signatures
1 Like

Q 2) Two use case for public key cryptography are digital signature used in e-commerce and cryptocurrencies which they form a foundation aspect of.

Cryptocurrencies utilize digital signatures to sign transactions. Public key cryptography can also be used as encryption. :slight_smile:

1 Like

Q: Describe the concept of public and private key with your own words.
A: a Private Key is basically a random number which can be used to generate a Public Key. The Private Key can be used to sign a SEND transaction, and Public Key can be used to verify something you received is from a Particular person (you use that persons Public Key)

Q: What 2 use-cases can public key cryptography be used for?
A: Encryption and Digital signatures

1 Like
  1. A mathematical relationship between two entities in a given communication network, where one entity, the private key, generates the other, the public key, using a one-way function; and the public key can be used to encrypt a message that can only be decrypted by the underlying private key
  2. Encryption and Digital Signatures
1 Like
  1. The concept of public and private keys is a way for you to keep the information you send through the internet safe and private through encryption.

  2. Sending a message over the internet that you want to stay private and secure and of course a bitcoin transaction.

1 Like
  1. The public key is used to enrypt sensitive information and the private key decrypts the information on the other side, that was encrypted with the use of the public key.

  2. Digital Encryption and Digital Signatures(to verify messages)

1 Like

1 Private keys are used to encrypt/decrypt messages. Private keys are random numbers that are hashed to obtain public keys. Only the holders of private keys are able to get the public key through a hash. This allows digital signatures and verification.
2 The uses of this are enabling secure digital signatures and verifying all transactions.

1 Like
  1. Private key is a generated random number. If you own the private key, you own everything which is under the private key. It is secret code that nobody else knows. From this private key is public key derived according to a formula. Public key is basically used for data exchange with others and others can see it. Public key can be derived from private key, but not visa versa.

  2. Public key can be used for encrypting the message and only private key (from which was public key derived) can read this message. Second use-case is for digital signiture - digital signiture is created with private key and you can compare the public key with the signiture to verify the person.

1 Like
  • Describe the concept of public and private key with your own words.
    An mathematical method to encrypt a message using a publicly shared key, whereby the private key can decrypt the message. The Private key generates a Public key

  • What 2 use-cases can public key cryptography be used for?
    Encrypted message transmission
    Verifiable document signing

1 Like
  1. Describe the concept of public and private key with your own words.
    So your computer generates a random number which is huge, this is your private key. From here your public key is derived mathematically from your private key. So your private key is to be kept very safe and your public key is the one that you an use on the internet.

  2. What 2 use-cases can public key cryptography be used for?
    Hashing a large data file to create a digital finger print to prevent any manipulation of numbers.
    Sending encrypted messages between people

1 Like
  1. Private and public keys are a means to encrypt and decrypt data. The public key is used (hashed?) to encrypt the data. In order to decrypt one must be in possession of the private key. Without the private key, it is in theory, impossible to decrypt.

  2. Two uses of public/private keys are cryptocurrency transactions (digital signature) and sending private messages (encryption).

1 Like
  1. The private key is a random number generated by your computer. A public key is derived from the private key, it can be shared/seen by others. Public key can be used to encrypt a message and the associated private key to decrypt.

  2. Encryption and digital signatures are 2 use cases.

1 Like
  1. A private key is one that only you have access to, it is randomly generated and through it a public key can be made. The public key is viewed by all and is when compared to the ā€œsignatureā€ of the private key it assures the two are from the stated sender. Though the two show a connection, there is no way to decipher the private key by having access to only the public key.

  2. The two use-cases that public key cryptography can be used for are encryption and digital signatures.

1 Like
  1. A private key is a random number or random data, generated by your computer. A public key is a number or data derived from the private key via a special function, which allows encryption of data that can only be decoded using the private key.
  2. Encryption and digital signature.
1 Like
  1. Private keys are made to secure information. Private key is not known to the public. A public key is created and paired to the private key and is used to transfer the information in a way that only the private key can open said information. The private key is generally a very large number. 2. Public key cryptography could be used to send lab results from a lab to a doctor. In bitcoin transactions are used with public key cryptography. Bitcoin is sent via a public key to the private key paired with it. If someone wanted to send me bitcoin I would give them my public key to initiate transaction, they would then send me bitcoin attached to that public key that only I could accept and use via my private key.
1 Like

1. Describe the concept of public and private keys with your own words.
Private keys are randomly generated numbers that are used to derive public keys. Private keys need to be kept secret. Public keys can be shared. Public keys are derived from private keys and this is a one way function. Private keys cannot be discovered with the use of public keys.

Public/Private key combinations are used to ensure privacy in messaging and communications. The sender knows the public key and uses it to hide the content of the message through encryption. Data from the sender is encrypted using the public key of the receiver of the message or transaction. The encrypted message is received and decoded by the private key of the recipient.

2. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures

2 Likes