Homework on Public and Private Keys - Questions

1. Describe the concept of public and private key with your own words.

The concept of a private key is to be able to generate a public key via that private key.
That public key is unique to the private key that generated it and cannot be used to uncover the said private key.
Therefore, it is only possible to generate keys in a linear way; from private to public.

2. What 2 use-cases can public key cryptography be used for?

  • Encryption : Public key cryptography can be used to send messages through unsecure networks by encrypting the messages.

  • Digital Signatures : Identification and Integrity of public encrypted messages are verified by public key cryptography. The private+public key pairings can be used to validate the authenticity of an encrypted message via the digital signature that they convey.

2 Likes
  1. Describe the concept of public and private key with your own words.
    A private key is a unique random number which can be generated and should be safely stored and never shared. A public key is a key which is derived from or generated by a private key, and can be safely shared to receive messages or funds.
  2. What 2 use-cases can public key cryptography be used for?
    The two main use cases for public key cryptography are to encrypt, and send message and transactions as in Bitcoin.
1 Like
  1. A private key is a unique set of numbers and letters. With this private key you can generate a public key. A public key can be known and seen by every one, a private key you keep for yourself and cannot be shared with anyone. Messages between 2 entities can be encrypted by the sending party with using the public key and only read by the receiving party by using his private key.

  2. a. Encryption
    b. Digital signatures

1 Like

Describe the concept of public and private key with your own words.
Private and public keys are both personal keys that identify us in the network. But the difference is that Private Keys (which are to remain hidden or protected) is what make us digital, they are our signature. A public key is like a photo of us, and as a photo is derived from us, so is the public key derived from the private key. And more, a Public key it’s available to everyone, everybody can relate to us, and even use it to send us a message. However, if we want to make any transaction in the network, we need to sign it, as we sign legal documents out of the virtual world.

What 2 use-cases can public key cryptography be used for?
Public keys have two main use cases: encryption (to encrypt a message to someone, so only that person is allowed to read it) and Digital Signature (through the private key)

1 Like
  1. A private key is a computer generated number that sends a message with our personal signature on it. A public key is derived from the private key and is open to all to see-it allows the recipient to see the message and check the signature. You should keep your private key private.

  2. Public Key cryptography can be used for encryption and Digital Signatures.

1 Like

1.Describe the concept of public and private key with your own words.

Public key is used to encrypt sensitive information and the private key decrypts the information that was encrypted with the use of the public key. Only person who generated the real private key can see it.

2.What 2 use-cases can public key cryptography be used for?

For encrypted messages and digital signatures that verify the owner.

1 Like

Describe the concept of public and private key with your own words

The public key is derived from the private key and is used to encrypt end-to-end information. Private keys are used as a verified 'login' to decrypt the end-user information from the unique public key.

What 2 use-cases can public key cryptography be used for?

Public key cryptography can be used for encrypting end-to-end conversations/messages online in a public domain. Also as a digital signature for verification of the information from a user by using the private key as a decryption method.

1 Like
  1. With public key it can be seen by others and there’s no encryption and with private key there’s encryption which does not allow users to see what it is.
  2. The two used cases are encryption and digital signature
1 Like
  1. A private key, which is a completely
    random number, is generated by your
    computer. It is NEVER to be shared with
    anyone. This private key generates a
    public key, which may be shared on any
    public forum. Public keys may be used to
    encrypt messages, and private keys may
    be used to sign and to decrypt messages.
  2. Public key cryptography may be used for
    encryption, which is not really used for
    crypto currencies; as well as for digital
    signatures, in which it identifies the
    integrity of a transaction.
1 Like
  1. the public key is like the lock on your front door and the private key is like your housekey, except in numbers: it would take far too long to guess the right key shape but if you have the correct key it works quickly–here working quickly corresponds to a ‘one-way function’ that is much more efficient in one direction, like prime factorization, magic square puzzle, or any P = NP example really.

  2. Encryption and digital signatures.

1 Like

Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    Public and private keys are keys generated by a computer when sending messages between two people/nodes. This is done in order to ensure that a message may be sent over a public network without revealing the contents of the message. How this works is if computer A wants to send computer B a message, computer A generates a private key with a random number. Computer B encrypts it by assigning a public key generated from the private key, which is also randomized to heighten security by mathematically assuring only the sender and receiver see the contents of this message. Once computer B receives the message via public key, they decode it with the private key, which only both nodes are aware of.
  2. What 2 use-cases can public key cryptography be used for?
    Public key cryptography can be used for 1-encryption of data and 2-Digital signature to prove who sent or received the data.
1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a random sequence of generated numbers and letters that allows you to decrypt data, compared to a public key that allows you to encrypt data.

  1. What 2 use-cases can public key cryptography be used for?

Public keys are used for bitcoin encryption, and digital signatures.

1 Like

SHA256 is not used to derive public keys, for that the Elliptic curve function is used. :slight_smile:

1 Like

1. Describe the concept of public and private key with your own words
Private Key is a random number generated in order to encrypt your message.
Public key is a number generated from the private key.
You can get the public key from the private key.
You cannot deduce the private key from the public key because of the one way hash function.
Public key is public. Private key has to be kept secret.

2. What 2 use-cases can public key cryptography be used for?
A. Encryption
B. Digital signature

1 Like
  1. Private keys are randomly generated by a computer. Public keys are generated using the private keys. Anyone can use a public key to encrypt data. Only the owner of the private key can de-crypt the data.

  2. a. message encryption
    b. digital signatures.

2 Likes
  1. Describe the concept of public and private key with your own words.
    Enables you to send and receive transactions as well as look at your balance. A public key can be sent to another person for them to send you crypto. You will need your private key to access this sent crypto.

  2. What 2 use-cases can public key cryptography be used for?
    Digital signature and encryption.

2 Likes

Describe the concept of public and private key with your own words.

Imagine a postbox. Anybody can post a letter into a postbox using the hole in the top. The hole in the top is the public key. It stops people from removing other peoples letters or seeing where other letters are to be sent. The postman has the private key, he opens the letter box using his private key and can then see where all of the letters need to be sent to.

What 2 use-cases can public key cryptography be used for?

Puclic key cryptography is used for encrypted messaging. People encrypt messages using a public key given to them by the receiptient and the receipient opens the message using their private key.

A similar principle is used for Cryptocurrency wallets. A private key is generated and is kept secret. This key is how the owner accesses their wallet. The private key is then used to generate a public key and this is used to create a public bitcoin address (often a QR code). If somebody were to have access to your private key they can access your money.

1 Like

Homework - Public & Private Key Cryptography
Functions, Hash Functions, Cryptography
Q1. Describe the concept of public and private key with your own words.
A1. Private Key is generated by the user on their computer which provides them with unique and anonymous access to files and or accounts. The Public Key is provided to other users to access the information sent via the Private key holder. No trust is required as the system relies totally on verification. If you don’t hold a key, you can not access the information sent.
Q2. What 2 use-cases can public key cryptography be used for?
A2. a) Transfer of crypto currency between parties b) Transfer of sensitive / private files

1 Like

How is the private key used to create a tx? :wink:

1 Like

Homework public and private keys

1 These are like your ID but on the blockchain, it is used to encrypt data to send to users so they can decrypt it.

2 Cryptocurrency trading , or sending a message.

1 Like