Homework on Public and Private Keys - Questions

Great, thank you for your help.
I really appreciate it :smiley:

  1. Private keys are randomly generated numbers from device which through a one-way hash function generate public keys that can be openly shared to anyone as there is no way for someone to generate your private key. Along with this, the owners better not lose their private keys!
  2. Public key cryptography can be used for encrypting information and for digital signatures for use in bitcoin addresses sending and receiving transactions.
1 Like
  1. A private key can be generated from random numbers. Once you have a private key, you can use it to derive a public key from it. You can never derive the private key from the public key. The public key can be used for encryption, and the private key is used to decrypt a message.

  2. These keys can be used for encryption or to verify digital signatures. In cryptocurrencies, the keys are used for digital signatures.

1 Like
  1. Private key is a randomly generated number, from this private key we can then hash a public key. We cannot get the private key with only the public key.
  2. use-cases of public key cryptography are for encryption and digital signatures.
    encryption is used to secure the data sent or stored (the public key and data are combined into gibberish which can be decrypted by the intended receiver’s private key).
    signatures are used to verify the sender of data (private key creates signature, signature and public be used to verify the integrity/authenticity)
1 Like

And you can also use it to just encrypt some data for yourself.

1 Like
  1. A private key is a number of values which u hash to get you public key. people can use your public key to encrypt messages
    you can decrypt those message using your private key.
  2. Public key is cryptography is the public address used to send bitcoin to, the private key is what is used to access the the bitcoin that is sent to the public key
1 Like

1. Describe the concept of public and private key with your own words.
In cryptography the pair private and public is use to identify uniquely the message origin and the ability to read the message by the holders of the public key

2. What 2 use-cases can public key cryptography be used for?

Encryption : keys pair , private and public the capability to encrypt and decrypt message using private and public key

Digital Signature : To identify uniquely the origin of the message

1 Like
  1. The private key is needed to read the encrypted content, the public key is used to encrypt the content which can be read with the private key.

  2. To verify the signature, encrypt the content

1 Like

A private key is a random number that is generated by a computer ( it represents ownership in some way) than from the private key you can generate a public key. Given a public key you can generate an address. It is impossible to decipher public and private keys given an address. If you lose your private key you lose access to your funds ( or some sort of data )

Through a public key, you can encrypt data or digital signature, you also get a bitcoin address generated based on your public key.

1 Like

1 - Private key is a number generated randomly by my computer and this is visible only by me. Public key is a number generated from the private key with the use of a mathematical calculation. The public key is visible by everybody in the network.

2 - Public key can be used for encryption and for digital signature.

1 Like

The concept of public and private key is as follows:

Public key is used to encrypt a message/transaction sent and the private key decrypts the encrypted message that was sent. If I want to say something to Ivan with everybody in the room without them knowing what I said then I would whisper closely into his ear which is the message and encrypt that message with the use of my hands which cover my mouth, this is the public key. Ivan’s ear then becomes the private key because he is able to decrypt the message by listening with his ear. Nobody else can see or hear what the message was but it was transferred in a secure manner.

The 2 use-cases can public key cryptography be used for the following:

  1. Digital signing and verification of a sent transaction/message by the public key
  2. Sending sensitive data i.e. Cryptocurrency which requires encryption over a unsecure network.
1 Like

1.- The public key is used for encyption while the private key is used to decrypt it.
2.- Digital Signature & Encryption for Private and public keys.

1 Like
  1. Public and private are central in blockchain. It allows secure and safe value transfers through digital and unique addresses

  2. 2 use cases : encryption and digital signature

1 Like

Transactions on Bitcoin are not encrypted and only utilize digital signatures to work. :slight_smile:

1 Like
  1. Describe the concept of public and private key with your own words.

Private keys are randomly generated by a wallet. Usually a large number that from that private key, you generate through a hashing function a public key(address). It’s only a one-way asymmetrically possible to generate public keys and signatures.
Private keys are used for signatures of a transaction/(message) and public keys are used to verify that the signature is derived from a certain private key. (digital signatures == public key)

  2. What 2 use-cases can public key cryptography be used for?

Can be used to encrypt messages and to digitally sign/verify transactions(messages)

1 Like
  1. Describe the concept of public and private key with your own words.
    Public and private keypairs are used to securely transmit data. The public keys is derived from the private key and can not be reverse engineered. A private key is meant to be kept private/secure and public key to be used publicly. In the case of bitcoin wallets, private keys give access to a wallet to perform inbound and outbound (signed) transactions while a public key only allows inbound transactions.
  2. What 2 use-cases can public key cryptography be used for?
    Message decryption and verifying digital signatures.
1 Like
  1. they’re like secret passwords, the one is public and an encrypted version of your private key
    2.for digital signatures and encryption
1 Like

1.The public key is used to enrypt sensitive information and the private key decrypts the information that was encrypted with the use of the public key.

  1. The two use cases are encryption and digital signatures.
1 Like
1. Describe the concept of public and private key with your own words.

The private key is a random number that can be used to generate a public key using an algorithm & that public key can be used to in the case of encryption, to verify that a message that has a signature supposedly derived from the private key was in fact from that private key. In the case of encryption, If person A generates a random number to create a private key & the from the private key generates a number which becomes the public key, then Person B can encrypt a message using that public key & send it over an open network to person A & only person A will be able to decrypt it using the private key.

2. What 2 use-cases can public key cryptography be used for?
   Used for encryption & digital signatures.
1 Like

1 public key - is your personal adress, private key is like your weapon (you sign contracts, send transactions)
2 you can resieve transaction, autentification

1 Like