- Public keys are public, anyone can see, others can use it to send you encrypted data only you can decrypt. It is created from the private key. A private key is private and allows you to have a digital signature and decrypt messages.
- Encryption and Digital signatures
A Private Key is a number, I believe in the bitcoin encryption system, its has 256 numerical entries, randomly generated. The private key is used to generate a public key which an endpoint on an agreed upon elliptical curve from an agreed starting point G by multiplying G by the private key #, let’s say = K (which means adding G to itself K times). The endpoint is the public key. If an encrypted message is sent to a public key address, it can only be unlocked by the recipient using her or his private key.
This makes use of the trap door relationship in generating a public key. Even if a 3rd party knows the public key of an intended recipient, the 3rd party cannot reverse calculate the private key of either the sender or recipient. Hence the “security” in transmitting. Needless, private keys are never revealed to others.
Public key cryptography can be used to send messages encrypted and therefore only known to the sender and receiver and also can be used to create a digital signature so that the recipient knows a message (which can be a transaction) was ,in fact, originated by the intended sender.
-
Describe the concept of public and private key with your own words.
Private keys are created from random numbers and public keys are generated through a formula from the private keys. So Public keys are linked to Private keys and while the Public keys are shared everywhere, the Private keys are not shared and only held by the owner so that they can decrypt messages or transactions sent to Public keys. -
What 2 use-cases can public key cryptography be used for?
Public key cryptography can be use for digital signatures and encryption.
1.) A public key is something that can be used/seen by the entire network, such as a Bitcoin address. Whereas the private key is like a signature, used by only one person
2.) Used for encryption (used for safety when others are included) and verifying digital signatures (sender’s public and private key work together).
Private Keys/Public Keys terms are used in encryption and decryption. These keys are used to encrypt/decrypt sensitive information.
- The private key is used to both encrypt and decrypt the data.
- The public key is used to encrypt/sign and a private key is used verify the signature of the data.
1.private key is the only key that opens the public key’s door
2. encryption and digital signature
-
Describe the concept of public and private key with your own words.
Public key creates private key. The private key is a series of numbers that cannot be duplicated so only one person has access to it and it is used to make the public key. Public key can be seen in the open and is linked to your private key, but cannot be traced back to the private key. Messages are sent and the private key decrypts the message which is encrypted by the sender. -
What 2 use-cases can public-key cryptography be used for?
The two cases are encryption which is used when sending sensitive information to others where there are spectators.
The next one is a digital signature which is how you verify a certain person sent you a message.
- Describe the concept of public and private key with your own words.
It’s the concept that two security elements are needed in order to access an encrypted information. The public element is seen by everyone, but the private element is only seen by the receiver of the information, not even the sender can see this key and vice versa.
- What 2 use-cases can public cryptography be used for?
A website’s SSL/TLS certificate, which is shared publicly, contains the public key, and the private key is installed on the origin server – it’s “owned” by the website.
TLS handshakes use public key cryptography to authenticate the identity of the origin server, and to exchange data that is used for generating the session keys.
- Describe the concept of public and private key with your own words.
The Public key is used to interact openly on the network. The Private Key maintains possession of the Public Key.
- What 2 use-cases can public key cryptography be used for?
Encryption and Digital Signature.
-
Describe the concept of public and private key with your own words.
A public key is generated from someone’s private key and can be given out to anyone to allow an incoming transaction or encrypted information to be sent. Private keys are similar in function to a password/PIN code and should never be shared with anyone. -
What 2 use-cases can public key cryptography be used for?
Encrypt messages and digitally sign transactions with someone’s public and private keys working together.
-
Public keys are used as digital signatures when sending information which needs to be encrypted so that only the recipient can see it. Public keys are available for anyone to see. However to decrypt the message it needs to be signed by the recipient’s private keys.
-
For sending messages and sending funds such as on the bitcoin blockchain
- Describe the concept of public and private key with your own words.
- The public and private keys are cryptographic keys (basically long random numbers).
- They are uniquely related when the private key is used to generate the public key
The private key:
- As stand alone, the private key is used for both encryption and decryption (symmetric cryptography). This means the same key is used to encrypt/decrypt the message, so only sender and receiver must share the same key.
- It is kept as a secret, so this key is private and must remain confidential to its respective owner(s).
The public key:
- As the name says, the public key is publicly made available to everyone.
- It’s always mathematically paired with a private key.
- It’s used for encryption only; it cannot decrypt. The decryption is possible with the paired private key only. This method is called asymmetric cryptography.
- In asymmetric cryptography, sender and receiver does not have to share the same key.
- It is impossible to identify/find a private key by knowing/using the public key
- What 2 use-cases can public key cryptography be used for?
1 - Encryption/decryption (achieving confidentiality)
2 - Digital signature (used in asymmetric cryptography). A digital signature certifies that the sender is who he/she pretends to be. The message recipient verifies sender’s identity by using the sender’s public key. As the digital signature uses the private key of the sender, it means that particular sender is the only person who could create the digital signature. The digital signature ensures confidentiality, integrity and authenticity.
- Private key is something you keep safe in your pocket to digitally sign transactions and access your wallet. If someone else gains access to your private key, you lose access to your funds. The Private key is used to create a public key which is then available for everyone. The most important aspect is that output cannot equal input, hence nobody can reverse engineer from a public key to your private key.
- Encryption and digital signatures.
- Public Key=visible to anyone
Private key= Ownership
2.Digital Signatures
- Describe the concept of public and private key with your own words.
• This method is used so that unwanted spectators can’t view a message. For example, let’s say two people want to communicate. Person A creates a message and encrypts it with his private and public key, then sends it to person B. Person B receives the message encrypts it with her private and public key and sends the message back. Person A can then remove his public and private key and resend it and not worry about other people decrypting the message because person B still has her public key and private key encrypting it. - What 2 use-cases can public key cryptography be used for?
Blockchain Transactions, identify verification
You only gave one example
Both of these are examples of digital signatures. PK cryptography can also be used for encryption, though you did mention it in the first answer.
-
A private key is a randomly generated number that is created when a wallet is made and is used for security and identifiction. A hashed value of that number is a public key that is linked to that account. With cryptography, it is not possible for someone to derive your private key from your public key.
-
An encrypted digital signature, you can use you public key to send or receive a digital asset.
-
Public key = wallet address. Private Key = wallet key phrase,
-
Sending and receiving encrypted information.
-
The concept of public and private key. Public keys allow for your message to be viewed by others, it’s basically an unencrypted message. To protect the message you would encrypt the message with private keys. The public keys can generate a set of random numbers that creates the private keys, and serves as the basis for the encryption. The private keys can trace back to see which public key created and sent the encrypted message but the public keys cannot tract to the private key.
-
The 2 use-case for public key are, encryption and digital signature.