-
Describe the concept of public and private key with your own words.
A private key is a random number used to generate a public key through a hash function. The private key should remain secret and the public key can be shared publicly. By sharing the public key other users can use that public key to encrypt data or validate a signature. Encrypted data can only be decrypted with the correct private key. -
What 2 use-cases can public key cryptography be used for?
Encryption of data
Digital signatures.
- Describe the concept of public and private key with your own words.
Private key is an astronomically huge random number that is hashed. A function then produces its pair which is the public key. The use of the private key proves the ownership of a certain public key. - What 2 use-cases can public key cryptography be used for?
a. for Encryption. When one sends a message through non-secure medium, the message can be secured by “encrypting” it, (or making it unreadable), except to the one who owns the private key to it who can then unlock the original message.
b. For Digital Signatures. It is used to verify who sent the message.
- A person’s private key is a random identification code generated by the computer that allows you to decrypt data people send to you and allows you to “sign” data you send to others so that the other party knows for sure it comes from you and only you. The public key is another number which derives from the private key and is the code people use to encrypt the data that they want to secretly send to you. Even if the public key is visible to everyone on the blockchain, it’s impossible to gain access to your private key just by knowing your public one. So it’s very important to keep your private key secure.
2)First one is the one described above, the other one is digital signature verification that allows the receiver to be 100% sure that data has been sent from the one person they are interacting with. The sender uses his private key to sign the data and the receiver can verify, without seeing the private key, that it matches with the sender’s public key. This eliminates the middle man and erases trust from the equation.
-
Describe the concept of public and private key with your own words.
Private keys are private & used to access crypto funds & sign transactions. A public key is derived from private key, although the private key will be encrypted & cannot be deciphered from public key. Public key is used to share publicly to enable the transfer of funds safely. -
What 2 use-cases can public key cryptography be used for?
Keeping your private key private & encrypted. Also, for signing transactions either simply for yourself or with 2 x signatures for instance if using a business account with a bisiness partner.
- your private key will derive a public key that others can use to encrypt messages to you. You can then decrypt the message using your privat key. Your privat key creates your public key thats also your BTC adress AKA digital fingerprint.
2 encryption and digital signatures thats ensure that the transactions are coming from you etc.
- Describe the concept of public and private key with your own words. I create my private key and from there I create my public key. What’s encrypted with one of them can be decrypted with the other one and viceversa.
- What 2 use-cases can public key cryptography be used for? I can send a secret message to someone by encrypting the message with his public key so he can decrypt it with his private key. And I can digitally sign a message, by signing with my private key and letting the other end to decrypt the signature with my public key.
- Private key is kept confidential and is part of a public key pair, this pair now known as an address. The private key unlocks the public key’s encryption.
- Security of transferred information or digital funds by means of encrypted information and digital signatures
- The public key is generated by my private key, basically I can share any public key to anyone and get a encrypted message from someone. To read any of these encrypted messages or data I will need my private key to decrypt any information
2.Electronic Signature and Encrypted messages/email…
1: A random number is generated and used as a private key and kept secret, a function is applied to this input and the output is a public key which is available to all. The Public Key cannot be reverse-engineered to reveal the private key and as such the holder of the private key is able to exert and demonstrate control and ownership of a public address on an open network
2: Encryption and Digital signatures
-
Private key is large random number that owner should keep secret. Public key derives from private key and it is publically shared. Public key is used to encrypt a message that can be only decrypt by a person who has a private key. Private key is large random number that we should keep secret.
-
Encryption and Digital Signatures
- Describe the concept of public and private key with your own words.
The private key is a very large random number generated by a computer to indicate/verify one’s identity digitally. This private key is sent through a one-way function to create a public key, another very large number which will be unique and correspond only to the private key. The private key can be used for signatures and encryption, and the public key is there to indicate that the message is derived from the private key (the true digital identity of the sender)
- What 2 use-cases can public key cryptography be used for?
Public key cryptography can be used for encryption and digital signatures. To encrypt a message for someone, you can use their public key. That way, the only way for it to be decrypted is via their private key, which only they have access to. However, this use case is not common in cryptocurrency.
Digital signatures are used in crypto in that they are used to create a unique bitcoin address. When you send currency, you sign the transaction with your private key. For public viewing, the only indication is your unique bitcoin address, which is linked to your private key but cannot be used to derive your private key.
1- Public key it’s shared with everyone, that way someone can send you information, or bitcoin and only you can receive. Other way, it can be used to verify that a transaction was made by you, because the public key is generated from the private key
2- Encryption and digital signatures
-
Private key is a random number generated to encrypt messages for example. In order for me to receive encrypted message, my computer generates Public key which I can advertise publicly so others can send me encrypted messages. Now, I need my private key to read encrypted messages that others send me.
-
Two use- cases for public key are for example encrypted messaging or digital signature
- public key can be reachable for everyone and we use it to receive messeges or money from others
privat key is like a signature which belongs only to us, we can sent messeges and money using private key - 1-getti g messeges 2- getting money
-
a Private key is generated by your computer for a wallet and the public key is generated by the private key through a hash function that can be seen by all on network.
-
say someone wants to send a message to someone else but they don’t want to have anyone else well the private key take the info and generate a hash then sends it with a public key of the sender. then the receiver can get the message by verifying the info.
Bitcoin would be the second use. it sends transactions through the net securely
-
Describe the concept of public and private key with your own words. - Private key and public key create the ability to interact privately over a public network. Information can be encrypted and shared between users securly.
-
What 2 use-cases can public key cryptography be used for? - 1. Encryption of communication and 2. Digital signatures.
This will create a digital signature of the message which is the same method blockchains use to send tx (signing a tx). PK cryptography can also be used for encryption
-
Describe the concept of public and private key with your own words
Private key is a random number created by your computer, from that private key your computer creates with a unilinear method a public key. You keep your public key secret and share your public key with everyone. with these keys you can receive encrypted messages or transactions. -
What 2 use-cases can public key cryptography be used for?
a. People can use your public key to encrypt messages and send it to you and only you de decrypt them with your private key
b. Or you can sign a message with your private key and people can use your public key to make sure it was really you who sent the message
-
the private key is a random number generated by your computer and is used to create the public key. The public key is used to encrypt any message or transaction, which can then be decrypted with the private key.
-
encryption and digital signatures.
-
Describe the concept of public and private key with your own words.
Private key is the random number given to the owner by the computer as his digital signature. The public key is the address available for anyone interested in sending a transaction. -
What 2 use-cases can public key cryptography be used for?
It can be shared online without risking the private key.
Receiving funds.