Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    Your computer produces a private key ( which si private to you alone). You private key then produces a public key which others can see and use
  2. What 2 use-cases can public key cryptography be used for?
    Firstly it can be used for the encryption of messages from A to B where B uses their private keys to read the message from A.
    Secondly it can be uses to create a bitcoin address where people can send you Botcoin and then you can spend it using your private key
1 Like
  1. Describe the concept of public and private key with your own words.
    A computer generates a private key. A public key is derived from the private key. The private key can decrypt messages and signatures sent to the receiver via a public key. A person will not be able to figure out a private key by knowing the public key.

  2. What 2 use-cases can public key cryptography be used for?
    Digital signatures and encryption

1 Like
  1. A private key is tied in to you and you alone that allows for unlocking the public key you give out. The public key is used by others to send information to you to be interpreted by the private key. These are actually misnomers as you look at the function of a standard lock and key. The private key would be the lock. The public key would be like a physical key. But the public key is only allowed to enter the lock. The private key determines if the key works and that is by permission of the lock owner. Just a different way of looking at it.

  2. Sending and receiving information. IE: Digital transactions and digital signatures (verification).

1 Like
  1. Public and private key pairs are what is used to encrypt and sign digital objects. Each person will generate a private key, and from the private key the public key is generated. The public key is given out and the private key is kept secure by the generator. In in encryption a message to a person is encrypted with that persons public key. The only way the message can be decrypted is with the private key. When signing an objected, the signature is generated from the private key. When validating the signature the public key is compared with the signature to validate the signature was created with the matching private key.

  2. Encryption, and authentication (digital signatures).

1 Like

Transactions utilize digital signatures to work, PK cryptography can also be used for encryption. :slight_smile:

  1. Private keys are a randomly generated unique number that is used to signature to send a transaction or message. The private should never be disclosed to anyone. The public key is generated from the private key and can be seen by anyone. The public key is used to encrypt messages in which the recipient uses their private key to decrypt it.

  2. The two used case for public key cryptography is encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    Public key is seen by the public to sign and verify. Private key can only be accessed by the key holder.

  2. What 2 use-cases can public key cryptography be used for?
    Cryptocurrency and public digital signatures or and encrypted message.

1 Like

Describe the concept of public and private key with your own words.
Public key and private key build a key pair which is used for a cryptographic system, in particular for encryption and decryption. The public key could be made available to everyone. The private key must remain confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a public key may only be decrypted by its corresponding private key.

What 2 use-cases can public key cryptography be used for?
Data encryption and the ability to create a digital signature

1 Like
  1. A computer generates a private key. A public key is derived from the private key. The private key can decrypt messages and signatures sent to the receiver via a public key. A person will not be able to figure out a private key by knowing the public key.

  2. The two used case for public key cryptography is encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.

  2. A private key is a secret key the public key is derived from. The public key is used to encrypt and digitally sign messages. Only the private key can decrypt or verify messages/info.

  3. What two use cases can public key cryptography be used for?

  4. Encryption

  5. Digital signatures

1 Like
  1. The private key is used to encrypt data. Generated by a large, random number.
    The public key can be shared with everyone and they can use it to decrypt data that only I can encrypt.

  2. Encryption of messages, for example, and digital signature

1 Like
  1. The public and private keys are used in encrypting and decrypting a secret message sent from one party to another. When I send a message to let’s say Aaron, I will send it to his public key which then encrypts it and only Aaron’s private key will be able to decrypt the message I sent to him.
  2. digital signatures and encryption.
1 Like
  1. A private key is a randomly generated number and a public key is derived from the private key, but this public key can not be used to find the private key. The private key is meant to stay private and the public key is meant to be publicly available. This is a key-pair.

  2. Public key cryptography can be used for encrypting messages and verifying if cryptocurrency transactions are valid (sent by someone who actually has bitcoin).

1 Like
  1. Private Key is a random generated number assigned to your account or you depending on the use case. The private key then generates a public key, this key is seen by the public, making your private key impossible to reverse engineer.

  2. Two possible use cases are Encryption and Digital signature verification.

1 Like
  1. The private key decrypts the information that was encrypted, and the public key is used to encrpyt sensitive message.
  2. Encryption and digital signatures.
2 Likes

Nice one. The public key is used to encrypt while the private key is used to decrypt.

  1. Without a private key, you won’t get a public key at all. The public key is for everyone to see in a open source network. There is no way someone get find out your private key by using your public key.

  2. Encryption, Digital Signature

2 Likes

Its also used for digital signatures which are more heavily used in digital currencies. :slight_smile:

1 Like
  1. The public key is used to enrypt sensitive information and the private key decrypts the information that was encrypted with the use of the public key.

    1. Encryption
    2. Digital Signitures.
2 Likes

1.Private key is your unique personal key that decrypts information encrypted by the public key. A public key is visible to the public and is shared for digital signature and transaction. Your private key generates a public key but no one can find your private key from your public key due to mathematical improbability, however, you should not share this and need to keep it safe.

  1. Data encryption and digital signature
2 Likes