Homework on Public and Private Keys - Questions

A public key is generated from a private key. There is no way to go backwards from the public key to determine the private key. If i give the public key to someone, they can use it to encrypt a message that can only be decrypted with the use of my private key.

Public key encryption can be used to sign transactions, or to generate a unique address

1 Like
  1. Public keys are what you use to transfer value or data between parties. Private keys are keys that guard your data, and are only known to you or a trustee of your account.
  2. Transferring cryptocurrencies between two parties. Sending a recurring payment for a subscription service.
1 Like
  1. The concept of public and private key is built on the foundation of asymmetric cryptography. The private key is a random number and the public key is another number that is derived from the private key. It is not possible (mathematically or physically) to compute the private key from the public key. If a message is encrypted with the private key, everybody with the public key can decrypt the message. If a message is encrypted with the public key, only the holder of the private key can decrypt the message.

  2. Public key cryptography can be used for digital signatures or encryption of data, depending on which key is used.

1 Like
  1. Public and private key are used in cryptography to encrypt and decrypt messages. Public and private key are also used in digital signatures in order to verify who sent the particular message.

  2. The 2 use-cases that public key cryptography can be used for are encryption and digital signatures.

1 Like
  1. Public and private keys are essentially keys to a dual custody lock, a private key is created using entropy. It is then used to generate a public address and can be used to sign messages/transactions/files for verification. Then Alice can confirm Bob sent a message to her & receive a payment in BTC
  2. I think I answered it in the first question.
1 Like
  1. Describe the concept of public and private key with your own words.
    a) The concept of public and private key is based on the computer randomly generating a large number that becomes my private key, this private key should only be available to me. However, the input from the private key creates a public key which can be shared by all. It is not mathematically possible to translate my private key from the public key. When I send bitcoin, I sign it with my private key and send it to the recipients bitcoin address. The bitcoin address derives from the public key
  2. What 2 use-cases can public key cryptography be used for?
    a) The 2 use-cases public key cryptography can be used for are 1) Encryption for a message sent through an unsecure environment or 2) Providing a digital signature to confirm the validity of a bitcoin transaction
1 Like
  1. Describe the concept of public and private key with your own words.
    my computer generate a private key with is only known to myself. in order to send something to another address, it is converted from private to public key. the public key is seen by everyone in the network.

  2. What 2 use-cases can public key cryptography be used for?
    it can be used for encryption and digital signatures

2 Likes
  1. My private key is my own set of numbers that only I can see. This will verify that I am the original owner. The Public key is paired to the private key, there is a relationship but their is no possible way ever to know my private key from it. Public key will link anyone back to my private key without actually knowing what my private key is.

  2. Encryption which I share my public key with someone they can then encrypt a personal message and send it back and I can read it with my private key & Digital signatures which the private key performs a signature and went sent is verified along with the public key to ensure that its legitimately from the same private/public key combo.

2 Likes
  1. A private key is a secret key that is used to generate a public key and to decrypt messages sent to you by other people. A public key is visible to everyone and is used to encrypt messages, but not decrypt.
  2. Encrypting and decrypting messages and creating digital signatures.
1 Like
  1. Describe the concept of public and private key with your own words.

Public key is for everyone to see and can be shared. Public key is also used for encryption of data. Private key is for you only not for everyone to see. Privste key can be used to decryption of data. Also to sign Digital transaction. Private key is randomly generated by computer and then Public key is generated from Private key

  1. What 2 use-cases can public key cryptography be used for?

Data encryption and Digital signature

1 Like

The address is just a hash of the public key. PK cryptography can also be used for encryption. :slight_smile:

Not sure how recurring payments would be combined with PK cryptography. Cryptocurrencies use digital signatures to function and you can also use these keys for encryption. :slight_smile:

You only described digital signatures, you can also use them for encryption. :slight_smile:

  1. The private key is owned by one party only, and the public key is it’s counterpart that is available for the public. The public key can be used to encrypt information, which can only be decrypted by the owner of the private key. Also the private key can be used to sign information, which can be verified by the party that has the associated public key.
  2. Encryption of information, and signing of information.
1 Like
  1. Describe the concept of the public and private key with your own words. The public key is what you use to encrypt the data you want to send on a network to another person but a private key is the only way to decrypt the data originally sent for the recipient.

  2. What 2 use-cases can public-key cryptography be used for? Public key cryptography is used for the encryption of data and digital signatures.

1 Like
  1. The private key is a random number generated by your computer, the public key is derived from the private key and can be shared on an open network without exposing the private key.
  2. The public key can be used to encrypt data such as a message sent between two parties, only the private key will be able to decrypt the data to its original form. Another use case is signing a transaction to prove the originator, a public key can be used to verify that the signature came from the originators private key.
1 Like
  1. Describe the concept of public and private key with your own words.
    Public and Private key is a way that uniquely identify a person through private key which then can be used to communicate with other individual through the generated public key from same private key as well as signing a transaction.
  2. What 2 use-cases can public key cryptography be used for?
    a. for communication over the network.
    b. Signing a digital transaction.
1 Like
  1. Describe the concept of public and private key with your own words.
    The private key is the personal key you keep when decrypting a message. The public key is an hash generated with the private key that you use to send encrypted messages. This key can be openly shared with anyone as it is impossible to find the private key through it.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption, and Digital Signatures

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key: your private key is used to decrypt messages encrypted.

Private key is a variable in cryptography that is used with an algorithm to encrypt and decrypt code .(secret key) are only share with the keys`generator making it highly secure.

Public Key: encryption or public key cryptography is a method of encrypting data with 2 different keys and making one of the key,the public key available for anyone to use it.

Is the modern cryptography method of communicating surely with our having a previously agreed upon key

Public Key cryptography: involved a private key that can be used to encrypt decrypt and digitally sings files and a public key that can be used to encrypt and verify digital signature

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

there is a private key which is a number based on which the public key is generated. From public key you cannot reverse engineer the private key. These two can be used for many applications

  1. What 2 use-cases can public key cryptography be used for?

Secret messaging and signing transactions

1 Like