Decryption is not the same as digital signing. You decrypt an encrypted message.
With digital signature you sign a message to verify it was you.
1: The public and private keys are numbers generated by a computer, the public key is derivate by the private key. Its impossible to generate a private key like someone else private key.
2: to send and receive money and encrypt messages
Public and private key is a cryptographic way of ensuring the privacy of a message and verifying identity. The public key is a value that is derived from the value of the private key, but the private keys value can never be derived from the public key. This allows for a message to be encrypted using the public key and only decrypted using the private key, or for the private key to act as identification as verified by the public key.
- I think of private keys and public keys like a P.O. Box. You are given a key by the post office from which you can send and receive mail by opening the back of the box. This βkeyβ generates the P.O. Box address. People may now send mail to your P.O. box; likewise they will also be able to receive mail from your P.O. box. Since only you have the private key to open the box giving you the means to receive or send mail it acts similarly to a digital signature. Digital signatures with public and private keys are akin to the above example except they offer more secure and no middle man such as the post office.
- Sending encrypted messages like whatsapp, or sending crypto with a digital signature.
-
Describe the concept of public and private key with your own words.
The public and private key concept works like this.
A series of random characters is generated by an individual. This is the private key.
This random series of characters (the private key, that only the individual knows) is put in a hash function. The output that is calculated gives a different series of characters, this is the public key.
Because the private key is put in a hash (one way) function that is collision resistant the public key can not create the corresponding private key. This makes it secure. -
What 2 use-cases can public key cryptography be used for?
The public key can be used by anyone to send a message/transcations to the receiver, that holds the corresponding private key. Only the receiver can unlock this message using his private key.
The private key can sign a digital signature when sending a message/transaction and the receiver of that message/transaction can use the senders public key to verify the message/transactions. So the sender will know that it is the sender that send the message/transaction.
Also.
Sender can sign a message with his private key to the receivers public key.
Receiver can verify the sender send this message using the senders public key.
The receiver can sign a message with his private key to the senders public key.
The sender can verify the receiver send this message using the receivers public key.
The sender and the receiver both know their own private keys.
The sender and the receiver do not know each others private keys.
The sender and the receiver both know each others public keys.
The sender and the receiver both can verify that when they send or receive a message, that that message is send or received by the public key that can only be accesed by the individuals private key.
-
Private key is completely unknown to others, it is a combination of unique keys, from the private key it derrives a public key wich is visible to others. Itβs not possible to know the private key from the public key, only vice-versa.
-
They can be used to encrypt messages and digitally sign a transaction.
1- Private key is a random series of computer-generate characters that serves as a secret identifier for a user. The public key is generated from the private key and it used by other computers to verify that information was sent by a certain private key.
2- Two use cases of public key cryptography are message encryption and digital signatures.
- The private key is a large and completely random number. The public key is derived from the private key and can be share with anyone.
- It can be used for encryption, so lets say I send patrick a message I can encrypt the message with his public key and he will be able to decrypt it using his private key. The private key can be used to create a digital signature that can be used to sign a message/transaction. In that case, the public key can be use to verify that the digital signature really came from the private key of the public key.
1 Its a hashed data to secure data and make it unique! The public key was generated from the private key. to encrypt a message I use a public key and with private key Iam able to decrypt the message! Its not possible to go from public key to private key! Its mathematicly and physicaly impossible!
2 Encryption/Decryption and to sign a transaction!
- A private key is a random number that is kept secret for a user. The public key is made from the private key with a one-direction function and can be seeing by everybody. To encrypt a message the public key of the receiver is used so that only he will be able to decrypt the information with his private key. To sign a message the private key of sender is attached so that the receiver can check that public and private key belong to the same person.
- Digital signature and encryption.
Homework on Public and Private Keys - Questions
-
Describe the concept of public and private key with your own words.
Public key is a key one will use in communication/value transfer with others and will be visible to all other participants. Public key is derived from Private key. One can only derive public key from private key. It is not possible to arrive at your private key from public key! -
What 2 use-cases can public key cryptography be used for?
In cryptography we have two major use cases:
a) message/communication encryption, and
b) digital signatures for blockchain environment.
G.
-
In public and private key cryptography, each individual gets a private key and public key that is derived from their private key. The public key is shared across the internet while the private key is known only to the individual.
-
The two uses cases for Public and private key cryptography are:
- Encryption: If Individual A wants to send an encrypted message to individual B, individual A encrypts their message with individual Bβs public key. The message can then only be decrypted by individual B through the use of their private key. In this way, the contents of the message are known only to the two individuals.
* Digital Signatures: These are used to identify yourself and to verify the integrity of a message. When someone send a message, they use their private key to sign the message. The recipient is able to verify mathematically that the private key of the signature comes from sender's public key using a combination of the digital signature and the sender's public key.
-
Public key is generated from the private key, and it can be freely exposed and given to anyone. Private key is generated randomly and must be kept secret, knowing the private key is equivalent to ownership of the data.
-
a) Encryption of data, so that it can remain private to prying eyes.
b) Verification of data through the use of an encrypted signature based off the private-public key pairs.
The concept of private and public key is unique in my opinion.
Let see if I got it correctly:/
Your private key allows you to access the asset no 9ne can have access to except you. Your public key however has a different usage. It allows others to contribute into your assets.
Usages of public key:
Allowing others to make you contribution
Making others see you as cooler than the rest of mortals.
-
Public-Private key encryption is an asymmetrical system where you use one key (the private key) to encrypt or sign a message and another key (the public key) to decrypt or verify a message. The private key is a random number, the public key is derived from the private key.
-
Encryption and digital signatures.
-
The private key is a random number generated by a computer. The public key is a number BASED ON the PRIVATE key (the public key is derived from the private one, so they have a connection). In an open and transparent network, in order to broadcast messages or transfer goods safely to particular people we need two things - something confirming our identity (private key, which we should keep only for ourselves), and something like an address (public key, which is visible for everyone), where we can not only receive goods or messages, but also send them by signing them with our private key (thus confirming our identity).
-
I think I unintentionally explained it on the first question
Describe the concept of public and private key with your own words.
The public and private key concept is like the decoder ring spy toys. The scrambled letters are the public key, the decoder ring toy is the private key.
What 2 use-cases can public key cryptography be used for?
a) Sending encrypted messages through an unsecure/monitored channel or public platform, with the intended reader of the message holding the private key.
b) Digital signatures in cryptocurrencies which are created from public keys and verified by private keys of the sender of a transaction. This ensures verification that the owner of a wallet is indeed sending their crypto over the network and not an imposter pretending. This is where the saying βNot your keys, not your crypto.β derives from.
The two use cases of public key cryptography are:
- encryption where someone can encrypt a message with your public key that only you can decrypt using your private key
- digital signatures where you sign a message with your private key so others can verify that you are the one that posted the message using your public key
I think you only explained digital signatures, but you can also use them for encryption.
- Describe the concept of public and private key with your own words.
Public and Private key pairs can encrypt messages and verify their authenticity. This stems from the mechanism underlying these keys, in that they are computed using one-way functions. As one can only deduce the public key from a private key, messages can be encrypted using a public key and decrypted using the relating private key by the recipient. Simultaneously, the authenticity of messages or transactions can be verified by comparing the publicly available information sent out from a private key attempting to make a transaction or send a message β the digital signature and public key (it must be deduced that the digital signature stems from a private key paired with the public key).
- What 2 use-cases can public key cryptography be used for?
Encryption and Digital Signatures