Homework on Public and Private Keys - Questions

  1. Private keys are used to create a public key which can be shared with the public. If someone wants to send money or encrypt a message over a open network they can do so in a secure way by either encrypting the message or signing the message with a digital signature. What is cool about SHA 256 and private and public keys is, it’s a one way road. Meaning, you can generate a public key to share with the public from your private key, but can’t find the private key from knowing the public key. This is how Bitcoin cryptography is used to send and sign digital transactions.

  2. Encryption and Digital signatures as per the examples I gave in answer #1

1 Like

1, A private key is a (large) randomly generated number. A special process can be used to generate public keys from the private key.

2, Two use cases of public/private key cryptography are:

Encryption. A message sender can use a recipients publicly shared public key to encrypt messages sent to that recipient. The message is therefor unreadable in transit. The recipient can then use the corresponding private key to decrypt the message.

Digital Signatures. A private key can be used to digitally sign a message (i.e. create a digital fingerprint that can be sent along with the message). The recipient can then use the publicly shared public key to verify that the digital signature is valid. This tells the recipient that only the owner of the private key (i.e. the sender) was able to create the signature, and that the message has not been altered in transit.

1 Like

a public key is used to encrypt info and the private is like a key to see the info, there are lots and lots of combinations to make keys.

signing documents and opening documents

1 Like
  1. Describe the concept of public and private key with your own words.

Encryption of data for save exchange. The private key is generated from random numbers. The public key is then generated with the private key.
The private key must kept secret because it is the only tool to decrypt data that has been encrypted with the public key. The public key can be shared with everyone. It is not possible to get the private key with the public key

  1. What 2 use-cases can public key cryptography be used for?

-> 1. Encryption

Works with a private and a public key. Public key is used for encryption and the private key can decrypt the data. Private key should never be published or the data can be decrypted by someone who might not get that data.

-> 2. Digital signature verification

The private key is used to create a signature on a message or data. The public key can now be used to verify that the signature was created by the private key. The private key should never be published or somebody else can verify himself as you.

1 Like
  1. Describe the concept of public and private key with your own words.

    Your public key everyone can see and is used to send and receive info/payments. the public key
    encrypts the info, this public key is is linked to your own private key, which is unique and secure,
    and decrypts the info allowing only you to receive the info/payment.

  2. What 2 use-cases can public key cryptography be used for?

    Digital signature and  encrypting data.
1 Like

1: a private key is only yours and is used to allow u to receive data privately and to verify its you. A public key is on the network and is can be seen by anyone… It is created by your private key. U can decode ur public key with your private but not vice versa.

2:receiving funds and confirming that funds were sent

1 Like

Cryptocurrency transactions mostly utilize digital signatures to work. The other use case for public key cryptography is encryption. :slight_smile:

1 Like

Ahh… Thank you! Appreciate it!

  1. The concept of public and private key can be described as the core of the cryptocurrency and/or blockchain industry. A public key is a publicly observable cryptographic sequence generated by a private key, which is a personal cryptographic sequence that should remain private by the user/holder.

  2. The 2 main uses for public key cryptography are encryption (converting messages into a sequence of numbers in order to hide its contents, and can only be visible with the user(s) it is shared with) and digital signatures (as the name describes, it is a form of identification, ensuring the integrity of the sender).

1 Like
  1. ENCRYPTION: when an end-user wants to send a message or money, in order to keep it safe, his computer generates a secret number called PRIVATE KEY, which he/she keeps secret; and thru a special formula, he takes this private key and makes a PUBLIC KEY which is derived from the private key.
    PUBLIC key is for the world to see: there is no way for anyone to take his public key and arrive at his private key… We can always go from the private key to the public key but not vice versa.
  2. Encryption and Digital Signatures
1 Like
  1. A public key is what you share with others - when doing a transaction but the private key is for your eyes only never to be shared and decrypts the message.

  2. Encryption and to identify myself as a digital signature.

1 Like
  1. To me public keys & private key is like hashing. The Bitcoin network takes a set of random data (the public key), then generate a unique output (the private key). That private key is your unique signature to your Bitcoin wallet. The public key can be share publicly to receive data (message/funds), and because the data is encrypted only the person with the unique signature (private keys) will be able to view it. And just like hash function, you can’t take the unique private keys (output) to generated the public key (input).

  2. There are probably many things that public key cryptography can be use for. Right now we use it in the Bitcoin network transferring encrypted funds around. Those sent funds, are digitally sign.

1 Like
  1. private key is to increase the security of your property,if you lose this you lose access to your coins. the public key is used as an address to receive payments and this is manufactured from the private key. You cannot find the private key from the public key. In all the concept is security ensuring that only you are in control of your assets.

  2. public key to receive the encrypted message, private key to decode it

1 Like

1: Privat key is an extremely large and high random number.
Public key is generated by the privat key
2: 2 use-cases are digital signatures and encrypting data

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    A private key is generated by the computer and is statistically unique. It must be kept private and not shared. The public key is derived from the private key and can be shared with the public. One can only derive the public key from the private key in that order.

  2. What 2 use-cases can public key cryptography be used for?
    Peer-to-peer encryption through a public or open network and,
    Digital Signatures for identity verification and message integrity

1 Like
  1. Private key is the master secret from where the public key is derived. Public key can be shown to anyone without risk. The private key is the key that would allow to read an encrypted message with the public key pairing. In Bitcoin the private key is used to sign a transaction.
  2. Encryption and digital signature
1 Like
  1. Describe the concept of public and private keys with your own words.
  • A private key is a large number generated from your computer, this key is then used to create a public key that can be used to send you encrypted messages that you can unlock using your private key. The public key is derived from your public key.
  1. What 2 use-cases can public key cryptography be used for?
  • They can be used for digital signatures and private messages. Also creating bitcoin wallets.
1 Like
  1. private key is a random number and the public key is generated with the private key as an input.
  2. public key can be used for encryption of a message or to identy someone or something.
1 Like

Homework on Public and Private Keys:

  • Describe the concept of public and private keys
    • 1 Public Key matches only 1 Private Key, as they are mathematically related
    • Together they are used to encrypt and decrypt messages.
  • What 2 use-cases can public key cryptography be used for?
    • Used for Encryption, ensuring confidentiality of data
    • Used for Digital Signatures, to identify and verify who send the data
1 Like
  1. Private key is generated randomly by your computer and the a public key is derived from the private key. The public key is used to encrypt messages and the private key is used to decrypt them. In digital signatures the private key is used to verify identity.

  2. Public key cryptography can be used for encryption and for digital signatures.

1 Like