Homework on Public and Private Keys - Questions

  1. A private key is a randomly generated numbers and letters. The public key a different random numbers generated using the previously generated private key.
  2. We can use the private/public key pair to encrypt messages and to sign transactions.
2 Likes

1). A private key is a random number generated which is to be kept secret by an individual . A public key on the other hand is deduced from the generated private key through some special formula and its left in the open for anyone to see and use. The deduction of public key from a private key is one-way and therefore irreversible. It’s impossible to calculate the private key from the public key.

2). They are used in message encryption and Digital signature

1 Like
  1. Private key is a security code that uses a random number. Public key is something you can shared seen by others and is generated from your pivate key.
  2. Can be used for digital signatures or encryption
1 Like
  1. Describe the concept of public and private key with your own words.
    The private key is a random number generated by a computer, from the private key is generated a public key. The private key is secret and only you have aces to it, the public key is known to every one.
    Is not possible decode the private key from the public key.

  2. What 2 use-cases can public key cryptography be used for?
    One is to encrypt the messages, second is for digital signatures

1 Like
  1. Private key is a random number generated by your wallet, when you set it up, from the private key is generated your public key, which everyone can see. The private key serves as signature to “sign” your transactions and in your interest you should keep it secret. There is no way to get your private key from your public key.
  2. Encryption & Digital signatures
1 Like

1.Every public key matches to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can only decode it using their matching private key.

  1. For Encryption and Digital Signature.
1 Like
  1. Public and private keys are meant to be unique to an entity (person, organisation, etc) and are mainly used for encryption and digital signatures. A public key is a random very large (highly likely unique) number which is publicly available for everyone to see or use. The public key is used to generate a corresponding private key which remains secret and is not shared anywhere. The private key is used to confirm the identity of the entity it belongs to.

  2. Message encryption and digital signatures. In message encryption the public key of the recipient is used for encrypting messages and the private key for decrypting them, while in digital signatures the private key is used for signing and the public key is used for confirming the authenticity of the private key.

1 Like
  1. Describe the concept of public and private keys with your own words.

A public key is an address anyone on the internet can see. The public key can be used to generate a private key (which is used to secure, validate transactions.) This flow is ONE way and cannot be reversed.

  1. What 2 use-cases can public key cryptography be used for?

Encryption
Digital Signatures

1 Like

A Private Key is a random number that a computer generates that is unique. A Public Key is generated from that number and is pair with it. A private key cannot figured out from the public key. It is mathematically impossible. It would be like someone shuffling a deck of 52 cards and another person shuffling another deck and it being in the same order.

Two use cases for Public/Private Keys are encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.

Public and private key are used for comunication in a privacy way. To do it , the Private Key is generated randomly by the computer (random unique number). And then, generates a public key, that is used to share it in the network. It is only one way function, so it’s imposible to get the Private Key from the Public Key.

  1. What 2 use-cases can public key cryptography be used for?

Public Key cryptography can be used for encrypt and decrypt messages and can be used also to digital signatures

1 Like
  1. The concept of Pritate and Public keys is all about ensuring addressness and confidentiality in information exchange process. A Public key may be compared to a person’s address on an envelope, while that person’s Private key would then be his/her ID (passport, drivers license). It is the private key - ID - , that would allow the receiver to actually open the envelope and read the message, after the ID is presented to courier. Both keys are randomly generated big numbers. Public key is generated by putting Private key through cryptographic calculations. There is no way to obtain Private key just knowing Public key.
  2. Information encription and Digital Signatures.
1 Like
  1. Used for encrypting messages over an unsecured connection to be unencrypted by the intended recipient.

  2. Encryption and digital signature

2 Likes
  1. private key is secret, whereas the public key is to show to anyone who wants to verify that YOU send the message or decrypt one of your encrypted messages.

a. to decrypt a message
b. to verify the provenance of the message -->Signature = Message + private key

On Blockchain:
transaction(message)+ priv.key= signature;
Transaction+signature+pub.key = verified! ( pub. key verifies signature without seeing private key )

VERY USEFUL and classic VIDEO ON ThIS TOPIC: https://www.youtube.com/watch?v=bBC-nXj3Ng4

1 Like
  1. Public key is calculated from the private key. Unlike private key public key can be shared with anyone. Only you have access to the encrypted message sent to your public address with your private key. You can also sign messages with private key to verify it was you who sent it.

  2. Sending and receiving transactions

1 Like
  1. A private key is used to generate a public key and decrypts the information sent from a public key and is unique. Only the private key holder can decrypt it, so people seeing the public key is safe. If the private key is lost, the ability to decrypt is lost (and potentially the wallet content in the case of Bitcoin). If the Private key is stolen, the thief will have access to the contents of messages or in the case of bitcoin, the contents of a wallet.
  2. Encryption (e.g. sending messages) and digital signatures (e.g. Sending Crypto).
1 Like

Sending transactions utilizes digital signatures, you mentioned that in your first question. And encryption. :slight_smile:

  1. Describe the concept of public and private key with your own words.
    Public keys are open and anyone can see it. It is the key you share with others and they use to encrypt data only you can decrypt with your private key. The private key is one which you want to keep safe because it will encrypt the encrypted messages. The private key is also used to sign and shows that it come from you. Think of it as your secret identity.

  2. What 2 use-cases can public key cryptography be used for?

  3. Encryption 2. Indentification (digital signature).

1 Like
  1. Private keys are large random numbers generated by computers. They produces the Public keys. They are used to decrypt messages that are encrypted by the Public keys.

2…a. For Authentications
…b For Electronic Money.

1 Like
  1. Describe the concept of public and private key with your own words.
    A private key consists of random digits and is unique to a person and as such should be kept safe and secure. From a private key, a public key can be generated which can be seen publicly. It can only be decrypted by a private key.

  2. What 2 use-cases can public key cryptography be used for?
    The two use cases for public key cryptography is for encryption and a digital signature.

1 Like

Private and public keys are used for encryption and digital signatures. A private key is used for sending private data from one place to the next in a public setting and is unique to the individual who owns it. It is a safety lock to whatever is encrypted. The private and public key work as a linear protocol which first begins by the generation of a private key which pairs with a public key that is derived only from that private key. Only the private key can be used to decrypt and verify the information encrypted by the public key.

1 Like