Homework on Public and Private Keys - Questions

1. Describe the concept of public and private key with your own words.

A public key is required by the public to send encrypted data to the private key owner, then the owner decrypts the data using his private key.

2. What 2 use-cases can public key cryptography be used for?

  • Sending and receiving encrypted messages
  • digital signatures
1 Like
  1. You/your computer generates a private key, that you use yourself and that you should NOT share with others. From this private key, you can create a public key. The public key can be posted online or send to others. Others can use this key to send you encrypted messages, which only your private key can decrypt into the original message. With this it allows for enclosed communication on an open network.

  2. Encryption and Digital signature.

1 Like
  1. Public key is visible for everyone in networtk, is creating for sending messages or in Bitcoin network to sending transactions. Everyone can confirm you send it. Private key work for creating BTC adresses or sign in transactions with your private keys. If you lose private key you lose your Bitcoin.
  2. For sending messages or funds.
1 Like
  1. A public key is used to interact with an address and is publicly viewable. It is generated from a private key which is meant to be kept secure by the owner of that address.
  2. 2 use cases for public/private keys are encryption and digital signatures.
1 Like
  1. Private keys are random numbers generated by one’s computer (they are to be kept safe).
    Public keys are derived from private keys and known from the public.
    You can only go from a private key to a public key and not the other way around.

  2. Encryption and digital signature,

1 Like

A private key can generate a public key which can receive encrypted messages that only the private key can decipher. It is impossible to figure out the private key from the public key.

  1. 2 use cases for public key cryptography are encryption and digital signatures. Encryption can be used to send a message securely on a unsecure network and digital signature can be used to mathematically verify who it was sent by.
1 Like
  1. your computer generated a private key, a random and unique set of characters. This is used to create a public key. When sending messages to someone, the message is encrypted using the recipients public key. The private key is then used to open the message.
    2 Encryption and Digital signature.
1 Like
  1. A private key is an extremely large and highly random number. A public key can be derived using a one-way function from the private key. The public can be shared with other people while the private key is know only to the owner.

  2. Two use-cases of public key cryptography are: encryption and digital signatures. Encryption allows someone to encrypt a message using the receiver’s public key, but the encrypted message can only be decrypted using the receiver’s private key. This means the message can be kept secure over an open and unsecured communication channel. Public key cryptography also allows robust authentication to verify the integrity of a message/transaction by means of verifying the sender via a digital signature. A sender can combine a message with a private key to create a digital signature on the message. The recipient can compare the digital signature with the sender’s public key and can mathematically verify if the signature corresponds with the public key and is therefore valid. Bitcoin uses public key cryptography to send and verify transactions. Any legitimate private and public key pair is automatically a legitimate bitcoin address.

3 Likes

1.Describe the concept of public and private key with your own words.
The public key is the key anyone can access, the private key is your own key. If you want to send a message or proceed to a transactions with someone else you will need both. The public key will be opened to anyone but your private key will be encrypted if you want to send it to someone the mathematics will convert it so it is only readeable by the one you’ve send it to.

  1. What 2 use-cases can public key cryptography be used for?
    The 2 use cases are : Encryption and Digital signatures (used in crypto transactions)
1 Like

A private key is a large random number that is kept secret by its owner, while the public key is shared with the world. Using a one-way function the public key is derived from the private key.

  1. Encryption: The private key is used to decrypt a message that was encrypted with the public key.

  2. Digital signatures: The private key is used to generate a signature for a message (usual applying the private key to a hash of the message). Then, the public key allows to verify that this signature was created by the owner of the private key.
    (Example procedure: Encrypt hash with private key to get a signature. Decrypt signature with public key and compare with hash of the received message.)

1 Like
  1. The public key is for anyone to use and send encrypted message to you - the private key is for you to decrypt the message
  2. Encryption and digital signature
1 Like
  1. Describe the concept of public and private key with your own words.
    A public key is what you give to other parties so that they can send a transaction documents, signatures etc. The public key encrypts the data.

The private key is kept private and is used to decrypt the data.

  1. What 2 use-cases can public key cryptography be used for? Receiving a transaction, document, contract etc.
1 Like
  1. A public key is a key that you can share public to send messages or transactions. A private key is the original key that is completely private and hidden. You use the private key to create the public key so it is shareable without the private key being hacked.
  2. Encryption - sending messages privately to each other
    Digital signatures - sending messages/value using a signature to validate who the key was sent from
1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a randomly generated number containing a significant number of digits in ASCII form. A public key is a shorter but still long string of numbers generated from the private key using a specific mathematical function. The public key is used as a identifier that can be used ‘publicly’ on the internet to transact with other entities. The public key is visible to others. A private key is known only to the owner. A private key cannot be derived from the information in the public key.

  1. What 2 use-cases can public key cryptography be used for?
  • Encryption. This enables a message to be sent across a ‘public space’ with spectators where only the sender and recipient know the contents
  • Digital signatures. This enables the receiver of information to verify the sender of the information (whether the information is encrypted or not) and therefore determine authenticity
1 Like
  1. The public keys and private keys. A public key is open to the public, yet not just anyone can use the public key except to encrypt data, at which point the only person that can decrypt the data to be read it is the owner of private key. Owner of the private key created the public key, with elliptical encryption, therefore making it impossible to work the public key backwards to know the owners private key. Has long as the private key remains private to only it’s owner, the data can not be hacked.
  2. Encryption and Digital signature
1 Like

Here encryption is only for yourself without sharing over a network. If you want to share a message /payment to another users public key, you alway need a digital signature

  1. The private key is the password, you need to keep it secret, with it anybody could sign the transaction from you wallet. Address wallet which is represented from the public key–>generated from the private key with an hash function
  2. Election or cryptocurrencies
1 Like

Elections would probably utilize digital signatures same as cryptocurrencies. Public key cryptography can also be used for encryption. :slight_smile:

1 Like

Thanks Fabrice! Makes sense - changed my notes accordingly. Cheers :smile:

1 Like
  1. Describe the concept of public and private key with your own words.
    The combination is used to encrypt and decrypt data so you can securely send it over the network.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption, decryption(digital signature).

1 Like