Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
  • A public key is generated from you private key and can be made public.
    When someone wants to send an encrypted message they take te public key of the receiver and use that to encrypt the message
    The public key is also used to verify if the transaction is actually sent from the person in question.

  • A private key is a random number generated from your computer.
    It is used to sign transactions on the blockchain.
    The private key is also used to decrypt an encrypted message that has been sent to you.

  1. What 2 use-cases can public key cryptography be used for?
  • Message encryption
  • Digital signatures for identification and integrity.
2 Likes

Describe the concept of public and private key with your own words.
Public key is created from private key. Only private key can open data encrypted with public key.

What 2 use-cases can public key cryptography be used for?
Encryption and signing

2 Likes
  1. A public key is utilized to encrypt sensitive information while a private key has the ability to decrypt the information that is encrypted by the public key.

  2. The two use cases of public key cryptography include digital signatures and encryption.

2 Likes

1.Private keys are used to decode public keys. Private keys are randomly generated by your computer. Public keys can be seen by anyone on the network but can only be accessed by two unique private keys.
2. Digitial signatures and sending encrypted data.

1 Like
  1. A private key is generated by a computer using a mathematical equation that is unique to that person and can never be figured out by anyone else unless it is stolen or shared which is not recommended at all. The public key is generated off of the private key and can be shared across the public network for encryption purposes.

  2. Public-key cryptography can be used to verify a digital signature sent in a message confirming the original source and it can be used to send an encrypted message across an open network keeping the content private from the public.

2 Likes
  1. Describe the concept of public and private key with your own words.
    Privat key is random number generated by computer. Public key is generated from private key. Public key is for examble your Bitcoin adress where other parties can send you Bitcoin. Nobody can crack private key form your public key because of endless mathematical options.

  2. What 2 use-cases can public key cryptography be used for?
    Encrypted messages and wallets

2 Likes
  1. Through PGP, you are able to encrypt, sign and decrypt data if you are sending it through an open / unsecured channel. The system is made of users who have private and public keys. You are able to decrypt data and check it’s signature if you have the public key of the sender. And you are able to encrypt data if you have your private key and the public key to whom you want to send it.

  2. Encryption and Digital signatures

1 Like

Answer#1. A private key is a large random number that your computer generates and a public key is derived from that private key. The private key must be kept secret by its user, however, the public key is freely available to anyone one the internet. Public and Private keys are used in combination for encrypting and decrypting messages on unsecured networks.

Answer#2. The two use-cases for Public Key Cryptography are:

  1. Encryption – for securing data.
  2. Digital Signatures – validating/veriyfing who sent a message by using the digital signature and the public key of the sender.
1 Like
  1. The concept of public key & private key are made of random numbers generated by a computer. In the essence of two recipients sending information or messages to each other. The sender’s origin location ( public key) can viewed by others from the outside. Creating a private key derived from the public key ensures the authenticity , security & confirmation that only that information is shared between the two. No one else.

  2. Cryptography can be used for digital signature & encryption. For example funds transferred.

1 Like
  1. Describe the concept of public and private key with your own words.
    A private key is randomly generated by a computer. The private key can then be used to generate a public key. The public key cannot be used without the private key signature.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures
1 Like

1)Public keys are viewable by anyone viewing the network and are used to encrypt to create private keys
2)Encryption and digital signatures

1 Like
  1. A private key is the secret recipe for KFC and the public key is the chicken. When you eat the chicken you can verify by the taste and where you bought it that it came from KFC but you do not have the recipe to steal the actual valuable information. The recipe is used in order to make the chicken but you can’t use the chicken to derive exactly what the recipe is.

  2. Encryption and digital signatures. It can be used to encrypt information over public communication routes so that only the intended recipient can view the information by using their private key. Digital signatures can be used to verify that the transaction that took place originated from the right person.

2 Likes
  1. Describe the concept of public and private key with your own words.
    *Private key is generate by a computer. Private key generate a public key *
    Public key everyone can see but can’t be used without the private key.

  2. What 2 use-cases can public key cryptography be used for?
    1. encryption
    2. Digital signature

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    Public and private keys are used in cryptography and are at the core of the cryptocurrency industry. A private key can generate a public key and the pair combine to form a cryptocurrency address. Each wallet is based on a public and private key pair. They are how we identify oneself, or the integrity of the sender.

  2. What 2 use-cases can public key cryptography be used for?
    Public key cryptography can be used for encrypting cryptocurrency transactions and/or sending messages over the open internet.

2 Likes
  1. Describe the concept of public and private key with your own words.
  2. What 2 use-cases can public key cryptography be used for?

The private key gives birth to the public key. The private key is used for signatures and the public key is used to encrypt messages and is then decoded by the private key holder.

translating a message encrypted w a private key and verifying a private key signature.

1 Like

Transactions utilize digital signatures to work. To send messages you usually use encryption. :slight_smile:

  1. The concept of private and public keys is described as this: A private key is a randomly generated number that ONLY the owner of that corresponding wallet has access to (unless it is stolen or lost). This private key is never exposed to the public. It is used to decode messages/transactions that were sent to your PUBLIC key, which is a number that is generated and derived FROM the private key that ANYONE can see and send messages/transactions to. In order to verify a transaction that came in, The digital signature that is applied to this transaction should match the public key of the other person.

  2. 2 use cases for public key cryptography are: Encrypt messages (so only the person with the private key on the receiving end of the public address can decrypt) and Digitally sign these transactions.

1 Like
  1. Private key is generated randomly by a person to be used privately or keep for himself / herself.
    Public key is generated from a private key. Public key can be seen or shared by the public, for example on the internet.
    The sender creates the private key and with that generates the public key. This will be shared with the public. The receiver of the message takes the public key and decrypt the message with the private key.

  2. Two Public Key Cryptography use cases:

a. Encryption : a public key (which is created by the private key) is alway open to the public. The public key is used to decrypt the message using the private key. Without the private key that created it, it is impossible to decrypt the message. So, if the message was not meant for you, there is no way you can have access unless you have the private key. Also, you cannot be able to use the public key to create or generate the private key.

b. Digital signature : this is used in cryptocurrencies to verify the identity of the sender of a message. The private key creates the public key but the private key is assigned a digital signature for the recipient to determine the sender. This method is used by bitcoin wallet to transfer - send or receive bitcoin from other bitcoin wallets.

1 Like

1.private keys are the secret password to your encrypted address (public address)BTC uses another layer to create your address from public key.
2 encryption and digital signatures.

1 private keys are the secret passwords to your encrypted public key BTC adds another layer by enrypting the public key to make your BTC address.
2 encryption and digital signatures

1 Like