Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

  2. What 2 use-cases can public key cryptography be used for?\

  3. Public key is derived from a private key. These are typically used for Bitcoin but also allows the ability to send a private message over a public forum.

  4. Sending and receiving currency. Identifying the sender of a message.

1 Like

Answers:

  1. A private key is a computer generated cryptographic code that only you know and don’t share with anyone else. Using the generated private key you can cryptographically generate a public key that you can share with anyone you like (and even display publicly on the internet). It is not possible to determine a private key by knowing the related public key;
  2. The two use cases for private and public keys are i. data encryption and ii. electronic signatures. Electronic signatures is the use case which supports BTC/cryptocurrency transactions (i.e. sending and receiving crypto from/to your digital wallet to another external address).
1 Like
  1. Describe the concept of public and private key with your own words.Public key is visible to all and private key is you own secret code.These are one way functions.

  2. What 2 use-cases can public key cryptography be used for? for crypto and for signing digital contracts.

1 Like

Both of these examples would use digital signatures to work, the other use case would be encryption. :slight_smile:

  1. A public key can be shared with other users, and is used for the verification purposes and to encrypt messages… A private key is used as to read encrypted messages and is held only by the owner.
  2. Encryption and Digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a random number. Once generated, this should be kept private by the individual for whom it has been generated. This initial number is used as the input for a mathematical function that generates another number, public key, that is shared with anyone across the globe. If this public key is used to encode something, in all practicality, this encoded item will only be decoded by use of the private key that was the generator input for the public key. This is how secure messages may be sent on an insecure communication channel.

  1. What 2 use-cases can public key cryptography be used for?

Encryption is the earliest use case. Encrypt messages that may be seen by others, beside the intended recipient, but not read. Even people who have the public key cannot read the message. It takes the private key of the public key holder to read the message

Digital signature is the other, later use case. Digital signature show that the message received has been generated by the sender and is not spoofed by a person other than the initial sender. The receiver of the message can use the sender’s public key to prove the sender’s private key was used to generate the message.

1 Like

1.It is a type of security in unsecured network. To send and receive encrypted messages.
2. Messages/transactions.

1 Like
  1. Private key is a RANDOM number or string that can be used to create public key. It can only go this way and cannot go the other way around.

  2. encryption, digital signature

1 Like
  1. The Public key is the key that you can share. The private key is to be kept safe and secret. The public key encrypts a message and the private key decrypts the message.

  2. The public key can be used to sign a bitcoin transaction ( Digital Signature). A public key can also encrypt a message so that it can not be read by anyone until it has been decrypted. (Encryption)

1 Like
  1. A public key is created for all to see for communication or verification. It is usually used to send and encrypt delicate topics. A private key or the other hand, is created randomly that only the individual has access to. A public key can be generated from a private key but the reverse is nearly impossible to do. If an individual steals one private key, they would be able to decipher and read all one’s private messages.

  2. Public key cryptography can be used as a personal digital signature and encrypting information.

1 Like
  1. Describe the concept of a public and private key with your own words.

The private key and public key are in essence a set of cryptography that works in director correlations with each other.

The private key is essentially the master key that accesses any pieces of information encrypted in the public key. The private key can access the public key - however, the public key cannot.

  1. What 2 use-cases can public key cryptography be used for?
    Encrypted messages
    Digital Signatures.
1 Like
  1. Public key is used to share it with others to recieve cryptocurrency and private key is used to send crypto to others and to access your wallet.
  2. a) To encrypt a message
    b) Digital signature
1 Like
  1. private is your own personal secret key. It derives a public key that it is used for transactions. The private key is encrypts, decrypts and is a validator.
  2. encrypt and validate digital signature.
1 Like
  1. A public key is a public representation of a private key. Private keys are used for decryption and is a unique, highly secure fingerprint. Public keys are used for encryption and are addresses used to transfer/share information securely on a public forum. Their use cases/functions are different.
  2. Public Key Use cases: Encryption and messaging
1 Like

1. Describe the concept of public and private key with your own words.

In encryption a private key is a sequence of numbers generated to be kept by the originator. Public key is a sequence of numbers that are generated based on the private key. Only the private key is able to unlock the public key.

The public key is akin to a postal box. It is out in the open, anybody can see it, and drop mail in it. But only the one with the key to the box is able to access the contents within.

2. What 2 use-cases can public key cryptography be used for?

Encryption and Digital Signature

1 Like

Messaging would probably use encryption as well. The other use case are digital signatures which are used for transactions (signing a tx). :slight_smile:

  1. Describe the concept of public and private key with your own words.
    A private key is a generated number by a computer in which it may contain some message. It may be unlocked by a public key.

  2. What 2 use-cases can public key cryptography be used for?

  1. Encryption
  2. Digital Signatures.
1 Like
  1. Describe the concept of public and private key with your own words
    Private key is basically random number generated by the computer and that code you must keep safe, public key is the key that everyone can see and there is no way to get from public to private key
  2. What 2 use-cases can public key cryptography be used for?
    Encrypton and digital signature
1 Like
  1. Private key is a secret number that is known only for you. The private key is used to create a public key that is open for everyone. For example, if you want to send bitcoin, you sign the transaction with your private key and the other decentralized units in your network will know that it was you who actually signed it and therefore will approve the transaction

  2. Digital signing, and secure encryption of messages from one person to another

1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a random number generated by a computer. Using a mathematical calculation a public key is generated through the private key. Public key can be shared with everyone. A private key must remain secret at all the time or people can sign transaction and steal your money.

  1. What 2 use-cases can public key cryptography be used for?

sending encrypted messages and signing digital documents.

1 Like