Homework on Public and Private Keys - Questions

Well a message could be encrypted with the receivers public key and signed by the senders private key. But that would be two steps using different keypairs so you are right :slight_smile:

  1. Public key is a random number which is public to others in an asymmetric cryptograph system. Private key is a random number which is kept privately in an aysmmetric cryptograph system.

  2. a), Keeping the secret of communication in a public communication channel. b), Digital signature.

1 Like

Both are in my example.
Maybe formatting is a bit off.

  1. In order to encrypt data or information, that is sent to an address, private key is used to decipher the encrypted data or information.

  2. Two use cases are sending important data or information, or translating an encrypted message, or to verify a signature.

1 Like
  1. concept of public and private key: private key = private, can generate many public keys, and in Btc, a Btc address.
  2. use of public key: Most importantly!!! to publish, to get paid :slight_smile: ;; secondly, to encrypt a message to be send. Thirdly, as for Digital signature: public key is used in order to verify if the signed message (with private key) originates from the particular private key holder.
1 Like
  1. Describe the concept of public and private key with your own words.
    Both are just randomly generate numbers whereby the public key is deprived from the private key in a one-way manner.

  2. What 2 use-cases can public key cryptography be used for?
    encryption and digital signatures.

1 Like

Public and Private Keys - Questions
Describe the concept of public and private key with your own words.
Private key is a random set of numbers, which we must keep secret. From this number we generate a private key.
Privet key is the only access to our bitcoin wallet We lose it or someone takes it, then we have lost our coins.
Public keys are for us to share to receive coins to our wallets.

What 2 use-cases can public key cryptography be used for?
Encryption: Used mainly to communicate privately.
Digital Signatures: Commonly used in blockchains for sending Digital Contracts. The keys are used to establish the identity of the sending party and to verify the Integrity of the contents of the Digital Contract, thus creating a Trustless means of operation.

1 Like

Private Key you generate and hold and public key can be used to send encrypted information which private key can read. Public key can be generated and sent to another partys prvate key as a digital signature

Encrypted info and digital signatures

1 Like
  1. Public key is what everyone can see that is created from the private key which is a random number that is created by your computer.
  2. Digital signature and Encryption are two use cases.
1 Like

1 : Describe the concept of public and private key with your own words.

The concept of public and private keys is associated with the process of converting ordinary plain text into hashed fixed length outputs and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.

2 : What 2 use-cases can public key cryptography be used for?

1 : Encryption:

In Public-Key Cryptography two related keys (public and private key) are used. Public key may be freely distributed, while its paired private key, remains a secret. The public key is used for encryption and for decryption private key is used.

2 : Digital signatures

A digital signature can be used with any kind of message – whether it is encrypted or not – simply so the receiver can be sure of the sender’s identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something – assuming their private key has not been compromised – as the digital signature is unique to both the document and the signer and it binds them together. This property is called nonrepudiation.

1 Like
  1. Describe the concept of public and private key with your own words.
    Computer generates random number that is a private key , from private key derives a public key. Public key is visible to everyone and can be used to encrypt messages. Private key can be used to send Bitcoin via Digital signature.

    1. What 2 use-cases can public key cryptography be used for?
      Encryption and Digital Signatures
1 Like

1 - Public Key Cryptography involves the use of an inherent association between a private key and a public key. The public key is derived from the private key. The private key cannot be derived from the public key.

2 - Public Key Cryptography can be used in data encryption and digital signatures.

1 Like
  1. Public key enables private encypted info to pass through an open public platform

2 Sending info and sending payments.

1 Like
  1. private key - only you own a copy of the key
    public key - a public useable key generated with the private key encryption can only be decoded (or
    signed) when you have access to the specific private key.

  2. Encryption and Digital Signature.

1 Like
  1. Public keys can be seen by everyone and are generated by private keys. You cannot derive a private key from a public key.
  2. Public key cryptography can be used for digital signatures and encryption.
1 Like
  • Describe the concept of public and private key with your own words.
    The concept is to allow access to a file without giving someone the access to change it, in this use case it means you can allow someone access to see what is in your wallet and even transfer to it, but not the power to send out and remove or change files or currencies within the folder/wallet.
  • What 2 use-cases can public key cryptography be used for?
    Currency
    Digital signatures
1 Like

1.- A private key is generated by a computer which is like a password for the public key that is derived from the private key. The public key functions like a public address that can be seen by everyone in the network and the private key functions like a password in combination with the public key to get access to your e.g. bitcoins but also functions as a signature to sign a transaction.
2.- A public key cryptography can be used to encrypt something e.g. messages in a network or can be used as a public address to which people can send transactions.

1 Like
  1. A private key is generated by your computer and is unique only to you (or a specific wallet it was created for). So to access any info or send any coins from your wallet you need to use the private key to do so. The public key is generated from your private key and is seen by everyone and it is used to send info or coins to a specific receiver which can only access the info or coins with the private key.

  2. Encryption and Digital signatures

1 Like

Digital currencies mostly utilize digital signatures to work. Public key cryptography can also be used for encryption. :slight_smile:

  1. A generated private key is the bedrock. It will produce on top of it a public key. These two numbers work in unison to employ digital signatures and cryptography
  2. Encryption and Digital Signatures
1 Like