Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.

Public key cryptography uses a public key and private key, with the public key being open to the public and the private key being a secret. Depending on the order on which they are being used they will either provide encryption or verify a digital signature/authenticate.

  1. What 2 use-cases can public key cryptography be used for?

Public and private keys are used for encryption and digital signatures. When these keys are used for encryption, the public key (asymmetric cryptography) is used to encrypt data and is accessible to the public. The private key is then used to decrypt data. For digital signatures and authentication the process starts with the private key which verifies the signature/authenticates and verifies the signature/authentication.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is essential as it makes all transactions or texts possible, either to receive or open it…public key is generated from private key and correspondence to it, which is also important in two way direction

  2. What 2 use-cases can public key cryptography be used for?
    Sending encrypted email and sending digital money

1 Like
  1. Public and private keys are used as pairs to encrypt and decrypt messages. The private key is random numbers created by a computer, and the public key is derived from the private. This is a one-way function where the private key can only create the public key, and not the other way around.

  2. The public key cryptography can be used for encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is a randomly generated number. It can be used to encrypt messages and you can make a public key using a function.
    Public keys can be displayed publicly and can be linked back to your private key for proof of assets but cannot identify your private key.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption
    Digital Signatures

1 Like
  1. The public key is derived from the private key. The private key is kept secret while the public key can be shared by anyone. This allows for encrypting messages over unsecured connections and for verifying signatures.

  • Encryption: The public key can be used by anyone for encryption, but can only be deciphered by the owner of the private key.

  • Digital signatures: The owner of the private key is able to create signatures and those with the public key can verify the signature.

1 Like

1)Public key is a key generated from private key and is accessible by all and used to encrypt messages
Private key is a key used to decrypt the messages which is encrypted by public key and it has to be keep private
2)a)To send encrypt messages
b) To send messages or transactions with the help of digital signature

2 Likes
  1. Your public key encrypts the information, your private key decrypts the information.

  2. Encryption and digital signatures

1 Like

A private key is a user’s personal answer to their puzzle, which they want to hide.
A public key is derived from the user’s personal answer (private key) which may be utilized anytime a version or portion of the puzzle must be transmitted away from the owner to a desired location or usage.

Sending a sealed message with a signature and participating in a transaction involved with cryptocurrency/funds.

1 Like
  1. Private key is a number made by your computer that is uniquely yours. From this private key a public key can be generated. This public key is available for everyone to see. You can get the public key from a private key but you cannot get a private key from a public key.
  2. Public key cryptography can be used for both encryption and digital signatures. Encryption is done so that two parties can communicate on an open network but their messages are unreadable. Digital Signatures allow the reader of a message to validate that it was in fact the expected author of the message. The computer is able to verify with the digital signature that the message came from the private key of someone’s public key.
1 Like
  1. Describe the concept of public and private key with your own words.

The concept of the public key is to interact with the participants of the network, generate addresses, also to prove ownership to a currency via the connection to the private key. From the other side the private key is strictly personal and securely known only by its owner.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and Digital signature.

1 Like
  1. With the private key you generate a public key. The public key can be used to encrypt data and everyone can use/access the public key but only the private key can decrypt the data generated with that public key.

  2. It can be used to encrypt messages or files (emails or documents) and it can be used as a signature to verify you own the private key

1 Like
  1. Private key is generated by a random number and not shared to the public. The public key is generated from the private key and this is shown on the internet.

  2. Traffic encryption and Digital signatures

1 Like

Digital signatures are used to verify the message was signed with the corresponding private key, not the private key itself. :slight_smile:

  1. Describe the concept of public and private key with your own words.
    a private key can be generated from a random number. For all mathmatical purposes, a possibility of generating the same private key is 0. A public key (sharable) is generated from the private key.

  2. What 2 use-cases can public key cryptography be used for?
    encryption
    digital signatures

1 Like
  1. Describe the concept of public and private key with your own words.

A private key is used to generate a public key. The public key is only re-engineerable with the private key. As the name says, the public key is to be shared with the public. With the public key, B can encrypt data to send it to A. A, in possession of the the private key, can decyrpt the data sent by A.

  1. What 2 use-cases can public-key cryptography be used for?

Public key cryptography can be used to send encrypted data via a public network. Public keys can also be used to sign a message digitally, so the receiver can be assured that the identity of the sender is accurate.

1 Like

1.Private key is secret to you, public key is generated by your private key and can be seen by anyone
2. Digital signature and encryption

2 Likes

Describe the concept of public and private keys with your own words.
Your public key is generated by your private key and is used to encrypt data. It is visible to the public while your private key isn’t, and is used to decrypt messages.

What 2 use-cases can public-key cryptography be used for?
Encryption and digital signatures. Users can provide their signature digitally to verify their identity.

1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a randomly generated number kept secret. A public key is a number generated by a one way cryptographic function using the private key as the input.

  1. What 2 use-cases can public key cryptography be used for?
    One use case for PK cryptography is to encrypt and decrypt communications. In this case, the sender uses a public key to encrypt communications. Then only the owner of the private key can decrypt the message that was encrypted using the public key.

A second use case is digitally signing/verifying communications.

1 Like
  1. Describe the concept of public and private key with your own words.

Public key encryption makes use of a randomly-generated ‘private’ key–an extremely large number, and a public key which is a hash of the private key. The public key can be known by everyone, but data encrypted with the public key can only be decrypted by using the private key.

  1. What 2 use-cases can public key cryptography be used for?
  • Data encryption: data can be obscured and kept safe from view by encrypting it with the public key, and only the private key holder can decrypt it.
  • Digital signing: the owner of the private key can sign a transaction or a document, and thus can provably be the ‘owner’ of the transaction or document as no one without the public key can produce the hash in question.
2 Likes

The concept of public and private keys is a way to transition information through a public forum while ensuring the security of that information.

The 2 use-cases of public key cryptography are encryption and digital signatures.

2 Likes