Homework on Public and Private Keys - Questions

Digital signatures are mostly used in cryptocurrencies. Encryption is used a lot everywhere. Every HTTPS connection for example has an encrypted connection that utilizes this form of cryptography. :slight_smile:

2 Likes
  1. Private key is a very large random number. Public key is generated from private key.
  2. Encryption and digital signatures
1 Like
  • In order to send and receive transactions on blockchain you need a public and private key pair;
  • The private key is a random number which you use to sign when wanting to do something with your coins (or sending a message or doing any other transaction on the blockchain)
  • The receiver then takes your visible public key to with this see if it matches with your private signature
  • You however can never derive the private key from the public key
  1. for example for sending messages and verifying it if really came from the person that says it came from; or for transferring coins
1 Like
  1. A private key is a large randomly generated number meant to be large enough that it is likely to be specific to you (and that should be kept private) which can be used to digitally sign files. A public key is a secure hash of this key that is exposed to the public.

  2. Generating Bitcoin addresses and enabling reception of encrypted messages.

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

A private key is how you secure your information and how you unlock it. It is the input of the output of the function.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and Digital Signatures

1 Like

a public key everyone can see and a private key only you can see.
you can use it to recieve privately

Homework on Public and Private Keys - Questions

1. Describe the concept of public and private key with your own words.
SHA256 encryption is used for both public and private keys. The private key allows for transactions to be executed. The public key is used to generate a Bitcoin address. One cannot obtain the private key from a public key or a Bitcoin address.

2. What 2 use-cases can public key cryptography be used for?
Digital signatures (mostly used in Bitcoin) and encryption.

1 Like

I guess you mean encryption. The other usecase more broadly used in cryptocurrencies are digital signatures that are used to verify the authenticity. :slight_smile:

  1. Public keys are for evryone to see, a private key is to be kept secret. This key is used to open encrypted data. To be able to open encrypted data, it will be send to the beneficiaries public key, to then be validated by the beneficiaries private key.

  2. digital signatures and encryption.

1 Like
  1. Describe the concept of public and private key with your own words.
    A private key is something that creates a public key. You can only create a public key with a private key, not vice versa.
  2. What 2 use-cases can public key cryptography be used for?
    Can be used to send encrypted messages over a public network for either cryptocurrency or to sign a digital signature.
1 Like
  1. Public and private keys are basically two parts of a problem. This problem (encrypted message by a key) can be resolved only by using the other key that was used for encryption. There is no other kwown practical way to solve this problem to this day.

  2. Public key cryptography solves a long problem : secret sharing over an insecured network, without having a previously shared secret (key). That is the reason assymetric cryptography permits key sharing. In the case of SSL, this permits the exchanges of a common symetric key(more performant). Assymetric cryptography also enables digital signatures.

1 Like

1. Describe the concept of public and private key with your own words.

  • Private and public keys have a relationship between each other, that the public key is always derived from the private key. A private key can be an arbitrary random number. As the adjectives describe, the private key should be kept secret only to the owner of the key, the public key should be then distributed to the whole world.

2. What 2 use-cases can public key cryptography be used for?

  • Encrypting the messages, for example when communicating over the internet (through SSH or HTTPS) and digital signatures, allowing for proving that a message was produced by a certain entity.
1 Like

1. Describe the concept of public and private key with your own words.
Public and private key cryptography is a method of cryptography that allows anyone to send encrypted messages and/or digitally sign messages. A private key is a large number that is randomly generated by a computer which is to be kept secret by the owner of it. A public key is then generated using a formula. This public key is public-facing (anyone can see it without harm.) Someone can send a secret message by encrypting their message using the recipient’s public key, which then can be decrypted by the recipient using their private key. A message, which may or may not be encrypted can be signed by a sender using their private key. The recipient can then use the sender’s public and signature key to mathematically verify that it is indeed the sender’s private key that sent the message (without having to ever know or see the sender’s private key.) A public key can be generated using a private key but not the other way around.

2. What 2 use-cases can public key cryptography be used for?
Public key cryptography can be used for encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.

  2. What 2 use-cases can public key cryptography be used for?

  3. Public and private keys are ways of sending information or date from one recipient to another.
    They go hand in hand and are used together to enhance privacy and security. Public keys are for everyone to see while private keys are only seen by the owner or sender. Public keys are generated by private keys, therefore making it impossible for people to identify your private key.

  4. Two cases in which public key crytography is used for are digital signatures and encryption.

1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a random number that is generated by your computer and is only known to you but can be used to derive a public key that is shared with the rest of the world. The generation of the public key is a one-way function such that the private key cannot be derived from it. The unique relationship between a private key and its public key counterpart allows them to be used in public key cryptography.

  1. What 2 use-cases can public key cryptography be used for?

The two uses-cases for public key cryptography are encryption and digital signatures. Encryption allows anyone to use a public key to encrypt data. Once encrypted the data can only be deciphered by someone who knows the private key counterpart to the public key used during the encryption process. Digital Signatures are used to verify the source of data. In order to digitally sign data the user’s private key is used to generate a signature for the data. Anyone who receives the signed data can verify that the signature was generated by the user’s private key by using their public key

1 Like

1 - Private and public keys are key pairs with the following relationship:
- private keys can decrypt any messages coming from its derived public key.
- the public key can create (encrypt) messages that only the private key can read.
- the public key can validate that a messages was signed by the private key.

2 - use-cases are encryption and digital signature.

1 Like
  1. Describe the concept of public and private key with your own words.

Public Keys are encrypted keys that are available on the blockchain for all to see. Private Keys are ae created by an individual the only he can seek. Private keys can be used to create public keys but not vice versa. Private keys should be kept confidential, if lost or stollen the funds that the key guards are lost to the key owner.

  1. What 2 use-cases can public key cryptography be used for?

The two use cases for public key encryption are encryption and digital signatures

1 Like

Describe the concept of public and private key with your own words.
The concept of public and private keys was created to enable to encryption of sensitive information from one user to another. In order to send encrypted messages a user has to generate a private key, which is then used to generate a public key that can be shared with the general public.

What 2 use-cases can public key cryptography be used for?
Encryption is one use case. The second use case are digital signatures. Both use cases generates public keys from private keys.

1 Like

You can generate a public key from a private key but not viceversa. The main point is to proof that you know a secret without actually revealing it. More formally:

Signature(Message, Secret Key) = Public Key
Verify(Message, Signature, Public Key) = True/False

Encryption. Keep a message secret.
Digital signatures. Keep a message integrity. Most important for Bitcoin

1 Like
  1. Private Yey is an extremely large random number. Public Key is generated from the Private Key and shared with the public.

  2. The two uses are to generate addresses and to challenge BTC ownership on the network.

1 Like