Homework on Public and Private Keys - Questions

  1. Public key cryptography makes operating on the bitcoin blockchain possible. It is used for preventing anyone from exploiting and accessing the ownership of an address, while still being able to send transactions to it that only the sender and receiver can view. Private key cryptography creates a seed phrase that is very unique that also creates a public key. When sending a message with public key and a signature, someone can know that it was sent using a private key.
  2. Public key cryptography can be used to send messages to an address that only the recipient can view. Public key cryptography can also be used for verifying a digital signature which are the identity and integrity from the private key of someone’s message.
1 Like
  1. Describe the concept of public and private key with your own words.
  • Public keys are used encrypt and to send and receive private data. The private key matches the public key and is used to decrypt the data assosiated with the public key.
  1. What 2 use-cases can public key cryptography be used for?
  • Sending encrypted messages.
  • Cryptocurrency transactions.
1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a large number generated by a computer and should never be shared with anyone. This allows you to sign transactions and verifies that you own what you own. Anyone else with access to your private key has access to your crypto assets. A public key is generated from the private key but can be shared with anyone safely as there is no way to work out a private key froma public key / address. Public keys can receive assets but not spend them as this can only be done with the private key.

  1. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures. Data can be encrypted if the sender has access to the receiver’s public key - once the encypted message is sent only the recipient can decrypt using their private key. This means no one else will be able to view the data / message. Digital signatures work by the sender signing a transaction with their private key. The receiver can then verify that this was signed by the sender by comparing it to the public key of the sender.
1 Like
  1. private key is a randomized number, public key is generated from the private key, but no way to reversely derived the private key from public key
  2. Encryption and Digital Signature
1 Like

Both of these would use digital signatures. Another usecase is encryption. :slight_smile:

1 Like

:+1: thank you))))))

  1. Describe the concept of public and private key with your own words.

A private key is generated as a random which can then be used to generate a public key which can be shared as there is no reversal on the transaction
2. What 2 use-cases can public key cryptography be used for?
Encryption and digital signatures

1 Like
  1. The concept of public and private keys is that, you generate a private key which only you know and you are supposed to keep it safe and secret. Then, you generate a public key, which is by definition public, means known to everybody. With these keys, you can digitally sign any transaction or message that you are sending using your private key and anybody can easily verify using your public key that it is actually you who has send this message/transaction. On the other side, you can encrypt a message using someone’s public key to send them a sensitive message and only they can decrypt it using their private key, hence, nobody else can get to that message.
  2. 1 is Digital signature and second is encryption.
1 Like

Don Michelin - Questions

  1. Public key is the address used for public transactions and public data. A public key is also used for encryption on a public network. The private key is the sole ownership key to a wallet. A public key is derived from a private key. Guessing a private key would take odds never before seen in humanity. I’d say it’s like winning the lottery once and only once but beginning from the dawn of man and continued throughout the entire human history and no one has still won it. Those would be the odds of getting a collision upon private key generation.

  2. A) Encryption B) Digital Signatures

1 Like

1 Describe the concept of public and private key with your own words.
A public key encrypts a private key to send a message or transaction over an unsecured network.

2 What 2 use-cases can public key cryptography be used for?
Digital signatures when sending cryptocurrency and Message Encryption.

1 Like
  1. Describe the concept of public and private key with your own words.
    A number is randomly generated number then =plugged into a special alogrithm that produces another numbers. The algorithm will always produce the same second number from the first. However, the first cannot be reversed engineered to the first.
    These two properties make for a way to encrypt information and protect identities.

  2. What 2 use-cases can public key cryptography be used for?
    One can publish a public key which anyone can input into an encryption algorithm and encrypt digital information. Only the the holder of the private key can unscramble that encryption.
    One can also produce a number with the private key and send it with something as their signature. Anyone can take that signature number and validate it to the public key which consequently confirms the sender.

1 Like
  1. Describe the concept of public and private key with your own words.

Public keys and Private keys are both hash values. Using the public key you cannot figure out the Private key, but having the Private key you can figure out, decrypt, open, (verify) the public key.

  1. What 2 use-cases can public key cryptography be used for?
    a) An artist painting sold could be encrypted with a public key for everyone to know who made the painting, date and time stamp and name of the buyer. The buyer would also acquire the private key to the painting and if he/she sold it to another person in the future would transfer the ownership of the painting to the new buyer. He would update the public key to record in the blockchain who the new owner of the painting is and the new owner would get a fresh public-private key pair.

b) So everyone in the world could have their Public Key exposed to the world. If they want to receive funds or a message, the Sender would encrypt the message or fund transfer with the “recipients public key”. The message or funds could be read or received only by the recipient who holds the “private key” pair for that public key.

1 Like
  1. A private key is a long alphanumeric set of characters that the public key is derived from.
  2. Two use cases for public keys are: A. Encryption; B. Digital signatures.
1 Like

1. Describe the concept of public and private key with your own words.
The public and private key work together to communicate encrypted messages between parties. An example of communication would be sending value ownership in cryptocurrency such as bitcoin. Public keys are derived from private keys.
2. What 2 use-cases can public key cryptography be used for?
This can be used for encryption for communication and digital signatures.

1 Like

[quote=“ivan, post:1, topic:8431”]

  • Describe the concept of public and private key with your own words.
    The Private key is generated by a random number on the computer. And it uses that random number to derive the public key.
  • What 2 use-cases can public key cryptography be used for?
    For sending important and confidential information
    For interacting with third parties across the globe.
1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is a large string of random number (derived from the private key) that can be shared with anyone and used to encrypt a message.
    The private key is a personal key generated by the computer and it’s used like a digital signature to encrypt or verify autenticity of a message or transaction.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital Signature.

1 Like
  1. For any operations that requires encryption, public key can be used by a 3rd party to establish such an encrypted operation with a private key holder. Public key can always be deffered from the private key but not the other way around.
  2. Sending encrypted emails, or establishing server connection (when you upload your public key to a server and it allows connections only to computers with installed matching private key.
1 Like

A public key is generated by the private key. If someone sends a message with that public key it can only be opened with that one private key cause they are a pair now. encrypted messages are mostly used for important or sensitive data.

Digital signatures to verify a message comes that comes from a certain persone.
And encryption ofcourse

1 Like

The private key is generated when you open a bitcoin wallet, is important to keep secret for these reasons:

  • Access to our wallet
  • Keep safe our funds
  • Sign transactions

The public key is generated from the private key, it can be used to encrypt messages that can be only decrypted by senter.
Can be also share it with other as “address” to receive funds.

  1. Can be used for digital signatures and encryption.
1 Like
  1. Private key: random sequence generated automatically by the computer.
    Public key: is derivated from the private key but cannot be used to discover the private key. Also the public key as the name says, is the one everybody can see.
    When for example a message is being sent the person which sents the message can use the recipient public key to encript the message, and the recipient will use is public and private keys to read the message.
  2. Private messages, and secure money transactions.
2 Likes