Homework on Public and Private Keys - Questions

  1. When you first create your bitcoin wallet, your computer will generate a random series of numbers, this is your private key, it is astronomically impossible for someone else to have this same number. From here, you then generate a public key, and then a crypto / bitcoin address.

  2. Encryption and Digital signatures

1 Like
  1. Describe the concept of public and private key with your own words.
    Private Key is a random generated data/number. Public keys are derived from the private keys.

  2. What 2 use-cases can public key cryptography be used for?
    To encrypt data
    For digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is the one we keep for ourselfs to recover or decrypt messages or transactions we need to send on public networks.
    public key is the one we use to share send or sign verifying the person who send it. (like a fingerprint)

  2. What 2 use-cases can public key cryptography be used for?
    It can be used to send funds or messages on a public network using cryptography.

1 Like
  1. Public key can be visible to everyone (if you put it out there) and the private one is the one that all of us should keep to ourselves. Out of the private key we can generate the public key.

  2. They can be used for encryption and digital signatures.
    They are used in combination to ensure that the information is correct.

1 Like

You do that using digital signatures, but public key cryptography can also be used for encryption. :slight_smile:

Hi A
Yea i put that in my reply above it.
I still need some time to wrap my head around it… how these 2 work but ill get here.
:+1:

  1. A privat key is a random number which is used to generate the public key
  2. Encryption of messzages and digital signature
1 Like
  • Describe the concept of public and private key with your own words.
    The concept of public/private key is essentially the process of being able to identify and verify data that is being sent and received.
  • What 2 use-cases can public key cryptography be used for?
    Public Key cryptography is used for:
    1). Encryption
    2). Digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.
    allows for security, verification and privacy as it is one direction encryption (private to public)
  2. What 2 use-cases can public key cryptography be used for?
    encryption and digital signatures
1 Like
  1. Public and private keys are the two parts of the cryptographic system that all major cryptocurrencies are built upon.

A public key is derived from the private key, using a known algorithm, is known publicly and is primarily used for identification purposes.

Private keys are what give the system its security. It is generated only by the blockchain wallet normally from a pass phrase and it cannot be reverse generated from the public key. A private key gives ownership to the user by keeping it secret and are used for encyption and authentication…

  1. Public key cryptography can be used for encryption and digital signatures.
1 Like
  1. Describe the concept of public and private keys with your own words
    A private key is a random number generated by a computer. Using a mathematical function, this enables the derivation of a public key. A private key is used to digitally sign a message (transaction), and by using the senders public key and the signature, the recipient can determine that the message came from the sender’s private key.

  2. What 2 use-cases can public key cryptography be used for?
    a – Encryption: mathematically encoding a message so that only the holder of the private key (intended recipient) can read it. This is used for sending messages over unsecure networks.
    b – Digital Signatures: Verification of who sent a message

1 Like

1. Describe the concept of public and private key with your own words.
its like sending a locked chest to a person that has the key to match the lock and only they can open it and see whats inside
2. What 2 use-cases can public key cryptography be used for?
sending emails to people or sending crypto to other wallets or people

1 Like

[quote=“ivan, post:1, topic:8431”]

  1. Describe the concept of public and private key with your own words.
    In order to send the secret message from one user to another user no2 generates the random number private key which then transform in a public key then send it back to user no1 , user No1 encript this message and send it back to user no2 , in order to read this encrypted message user no 2 use its private key and opens the message, so private key only belongs to you, public key is generated from private key in order to send it in public…
  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital signature
1 Like
  1. Private keys are generated by an individual and its unique and should not be shared. Public keys can be derived from private keys. This is unidirectional and cannot go in reverse.
  2. Encryption and digital signatures
1 Like
  1. The public key is generated by the private key. The public key is used for sending and recieving data whilst encrypting it. The private key decrypts the information recived and also is used to sign off on any transactions to leave a digital fingerprint.

  2. Sending or recieving data

1 Like
  1. Describe the concept of public and private key with your own words. In symmetric encryption a single shared private key is used to both encrypt and decrypt whereas in asymmetric encryption (public/private) a private key can only decrypt or sign. Private keys cannot be derived from public keys.

  2. What 2 use-cases can public key cryptography be used for?
    a) encrypted messages - sender uses the receivers public key to create an encrypted message that can only be decrypted by the receivers private key.
    b) digital signatures - sender uses private key to generate a digital signature which the recipient verifies using the sender’s public key.

1 Like

:thinking: I think a private key can only decrypt or sign :slight_smile:

1 Like
  1. Describe the concept of public and private key with your own words.

The concept of public and private keys is data security and accessibility. Both keys are mathematically related and work as a pair to ensure the encrypted (by the public key) data or information is secured and can only be decrypted (by the private key) and accessible by the intended recipient who possess that related private key.

Another aspect of this key pair concept is the digital signature, where the data or information is signed using the private key by the originator and the public key is used to identify if the data or information is from the true originator.

  1. What 2 use-cases can public key cryptography be used for?

The 2 uses-cases are Encryption and Digital Signature. Encryption is used to prevent unauthorized access to the data and for ensuring data security. Digital Signature is used to validate the authenticity and integrity of the data.

1 Like
  1. Public key is used to encrypt a massage from a sender and the message can be decrypted by the private key of the receiver only
  2. a) Encryption is used to create a private message
    b) Digital signature is used to identify the integrity of the sender
1 Like
  1. A private key is essentially a random really big number chosen by your computer that is used as an input to create a public key which is the output of a function that used your private key as input. Your public key can be used to encrypt info which only your private key will be able to decrypt such as in the use cases in the following answer.
  2. a) encryption b) digital signatures
2 Likes