Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

    Private Key - used to decrypt the information.
    Public Key - used to encrypt the information.
    The public key is derived from the private key.

  2. What 2 use-cases can public key cryptography be used for?

    Encrypting communication to provide confidentiality.
    Digital signatures for sender authentication.

1 Like
  1. Describe the concept of public and private key with your own words.

A) a public key is a cryptographic key that can be used to send a private message to an intended person.
B) a private key is a random number given to you when you create a digital wallet, it is also your digital signature, so its just like in the world normally if someone knows how to sign your signature they can have access to all and any of your private data its the same with the blockchain, your private keys is your signature and if someone else get access they can see who sent what and also can transfer from your account.

  1. A) public key can be used to receive transaction
    B) public key can also be used to receive encrypted message.
1 Like
  • Describe the concept of public and private key with your own words.
    A private key is a random sequence of characters which must be kept secret and safe. The public key is generated from the private key and this should be shared. Keys are basically used to encrypt or sign a data set (or transaction) with the other part used to decrypt or verify the signature.
  • What 2 use-cases can public key cryptography be used for?
  1. For encryption, here, the public key is used to encrypt the data and the private key is used to decrypt the message (thus preventing unauthorised access to the information)
  2. For digital signing - her, the private key is used to sign the message and the public key is used to verify the signature thus verifying the sender.
1 Like

[quote=ā€œivan, post:1, topic:8431, full:trueā€]
Homework on Public and Private Keys - Questions

1. Describe the concept of public and private key with your own words.
A: Private keys are generated randomly on a computer and the public key is derived from the private key.
2. What 2 use-cases can public key cryptography be used for?
A: USE CASE 1: Encryption
USE CASE 2: Digital Signature–this is the principle that makes BTC secure. (BTC address is the combination of private key and public key.)

1 Like

1.Private key is for you only and the public key is the one you share with everyone.
2. One use case would be to secure a message that can only be seen by the intended recipient, a second use case can be as is the case in bitcoin that uses a public key to generate a bitcoin address that you can share with everyone.

1 Like
  1. Describe the concept of public and private key with your own words.
  • Private key is just randomly generated number, public key is the result of hash function applied to this private key.
  1. What 2 use-cases can public key cryptography be used for?
  • Public key cryptography is used mainly for encryption and digital signatures.
1 Like
  1. Describe the concept of public and private key with your own words.
    Private key and public key are two numbers that work together and are essential for securing digital messaging over the internet.

Private key is a very long number any individual should keep secret from any other party, It is a kind of a virtual key to your internet security capabilities. With your private key you can sign messages to ensure it was you sending the message and nobody altered the message in any way and you can decrypt encrypted messages sent to you using your public key.

The correspondent public key is another long number derived from your private key. You can’t obtain a private key from its related public key, it is unidirectional

Private key ———> public key

  1. What 2 use-cases can public key cryptography be used for?

Digital signature and message secure/private messaging through encryption.

1 Like
  1. Private and public keys are relational. Private key is used to derive a public key while you cannot derive a private key from a public key. A public key can be verified mathematically as coming from the private key.
  2. Encryption and digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.

Private key is a random number that is generated by your wallet and than by formula on your compuer it creates public key that everyone can see to veryfi the source of transaction and data. It is used for the crypto transfers and work only one way which means you can go from public key to private key and to your wallet.

  1. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signature
1 Like

A public key is a key that is used everywhere to encrypt data, the private key is used to encrypt the public key. The public key can only be unencrypted with the private key.

A public key cryptography can be used for ditigal signatures to confirm that messages or information is from a specific individual. A second use is to encrypt communication within a public platform with a second or third party. That data can be seen and relayed but only if you hold the private key to encrypt the public key can it be seen.

2 Likes
  1. The public key is used to encrypt information that is sensitive and the private key decrypts the information by using the private key.
    2.The public key can be used for encrypting data and digital signatures.
2 Likes

A private key is a random number created by your computer (never share this with anyone). A public key is generated out of the private key. They belong together. A public key is also used to sign a transaction. Later for extra security the developers also added the btc address.
2.
For digital signatures and encryption

2 Likes
  1. During encryption and/or digital signatures a private key is created that is only for the person whos computer created it. The private key will then create a public key that others are able to see. The public key will create a way for others to have an idea as to where the specific message came from but the private key will always be protected during this process. It is impossible to go from public key --> private key. You can only go from private key --> public key.

  2. The 2 use cases for public key cryptography is for encryption of messages and digital signatures in crypto.

1 Like

1.) Describe the concept of public and private key with your own words.

Public key is a privately held key that the owner uses to receive funds. IT can’t be used to send funds from or pull funds from.

2.) What 2 use-cases can public key cryptography be used for?

The privately held ā€œpublicā€ key can be used to receive funds and alternatively send a message that is signed by the private key for complete verification

PS - the system will not record this section and completed… the ā€œMArk as Completeā€ button is not working.

1 Like

Hi @Jimmy we noticed that a few students are having this issue recently. Can you please report it to [email protected] :slight_smile:

  1. Public and private keys are pretty much two words that really fit the meaning. Public key to me means anyone can access , view share or discuss openly what it is and shared globally. The public key is used to encrypt plain text or to verify a digital signature. And a private key is used to decrypt ciphertext or to create a digital signature.
  2. A public key uses a pair of keys to encrypt and decrypt data to protect it against unauthorized access or use. Also, to verify a digital signature.
1 Like
  1. A Private Key is a very large randomly generated number, meant to assign ownership and encryption to an account. This key must be kept completely private to be useful. A Public Key is generated using a one-way function to keep the two keys inextricably linked, but giving power only to the Private Key holder. Because there is no way to derive the Private Key from the Public Key it can be shared freely, and it gives whomever the right to simply ā€œreadā€ the account. In order to have full access to ā€œread and executeā€, so to speak, you must hold the Private Key.

  2. The first use is Encryption. The sender could encrypt their message with the receiver’s Public Key and openly send it because only the receiver’s Private Key will be able to decrypt the message. The second use is Digital Signatures. Digital Signatures are meant to verify the sender of a message. This message could also be encrypted, if necessary. A one-way function is performed on the sender’s Private Key to generate a Digital Signature. This Signature can be verified by the receiver because they are able to deduce that it came from the same Private Key that generated the sender’s Public Key.

2 Likes

Describe the concept of public and private key with your own words

The public key encrypts data, the private key decrypts that data. Public and private key pairs are used to send encrypted data or messages over an unsecured network.

The private key is a one-way cryptographic function, this is a randomly generated number by the computer that the public key is then generated from, the Bitcoin address is then created from a hash of that public key - that was derived from the private key.

What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures

1 Like
  1. Public and private key cryptography is ā€œdigital idā€ as i understood. That means that everyone has both, and private key is completely secret and its using for decryption of information dedicated only fot this unique key, and for digital signatures.
  2. Encryption/decryption and signatures.
2 Likes
  1. There are to people who want to privately and securely communicate: A and B.

Both of them create private keys they don’t share with anyone. Then public keys can be produced - these they have to exchange in order to communicate. Public key can be produced from private but not vice versa.

Example of communication:

A. When A wants to send a message it has to first sign it with his private key, then he has to encrypt this signed message with public key received from B.

B. After receiving this encrypted message B has to first decrypt it with its private key, and check the signature with public key received from A.

Messages can be not signed and encrypted or signed and unencrypted.

  1. It can be used privacy and authenticity.
1 Like