Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    A private key is used to create a public key and both are used to encrypt and decrypt information.

  2. What 2 use-cases can public key cryptography be used for?
    Encrypt or sign information.

1 Like
  1. A private key is a series of characters that are known only by you. an assymetric hash function is then used to convert that private key into a public key for all to see; this public key is such that it cannot be converted back to its original private key by the outside world.

  2. in the case of crypto, a wallet is defined by both the public key (which can be seen by others to deposit their money into) and the private key (which should only be known and used by the owner of the wallet to withdraw funds from the wallet and send elsewhere). when sending messages, public and private keys can be used to encrypt the message so that only the intended recipient can make sense of it, and to also provide digital signatures to assure the recipient that the message came from a legit source.

1 Like

Question #1: Describe the concept of public and private key with your own words.

In encryption a public key is created based on a private key that is generated by someone attempting to send private data. The public key is shared publicly as a sort of “address” for sending information. The public key does not give information that would give away private key information, nor the content that was encrypted with the original private key.

Question #2: What 2 use-cases can public key cryptography be used for?

Encryption and digital signing are the two major uses cases for public key usage. Encryption is used for safeguarding data and keeping it private. Digital signing or digital signatures are the second use case. The use-case for digital signatures is to confirm the sender or receiver of the message are accurate. This is done with public and private keys, similar to encryption.

1 Like
  1. The concept of a private key is that it stays with you only and only you have access to the content that the private key can access. The concept of a public key is for others to verify that you have received the content that they have sent you.

2.Public key cryptography can be used for 2 major use cases which are:
a) Encryption
b) Digital signatures

1 Like

The content is encrypted with the public key and can be decrypted with the private key. :slight_smile:

1.In cryptography, keys are strings of random-looking characters. The private key is a signing key, which is unique and should be kept secret. The public key or verification key is derived from the private key and is visible to all. For Example, the public key is like your mail address which you can share with anyone where a private key is the password of your mail account only you know.
2. Public-key cryptography use cases are Digital signatures, encryption.

1 Like

1: Using cryptography I can create a Private key which is a random number only known by me, then using a mathematical formula, i can create a public key which anyone can see, derived from my private key. I can encrypt a message with the public key of someone else and only they will be able to read it, because they will need their own private key to decode. This is ensures by the mathematical relationship between the private and public keys.

2: Digital Signatures / Encryption

1 Like
  1. The Private key is your own personal iteration of an SHA. By using a Private key you can secure and validate your personal account no matter what kind of account it is. By using your Private key and using it to get another iteration of your discriminate SHA you can generate a public key that anyone can see, but cannot reverse engineer mathematically to get your private key.

  2. This encrypted signature verification process enables you to share public keys with individuals and secure encryption communications whether it is for financial or business transactions, or simply to communicate in some other various way (like encrypted email).

1 Like

If you mean SHA256 its not used to derive public keys and private key is basically just a random number. To derive a public key from the private key the elliptic curve function is used. :slight_smile:

1 Like

Private key is a “secret message” and not in view of the public. Your computer generates this number randomly. Public key is what everyone can see and is also a random number.
The two use cases are Encryption and Digital signatures. Bitcoin is mainly used in digital sig natures to verify who sent particular transaction. Your Bitcoin address is the public key when you send/receive from the wallet.

2 Likes
  1. Public and private key pairs are used in cryptography. Private keys are a randomly generated number which is then processed through a one way hash function to produce the public key. Private keys are kept secure by the owner and public keys can be shared with the world. The unique relationship between the two keys is used to verify information.

  2. Encryption and digital signatures

1 Like
  1. A private key is a randomly generated. A public key is derived from the private key.

  2. A public key can be used to send or receive data.

1 Like
  1. Public and private keys allow for you to receive and send encrypted messages and signatures. Th public key is for others to be able to encrypt messages to you and the private key (which is meant to be kept private) is for you to use to decrypt the message encrypted using your public key. Your private key is used to confirm things encrypted with your public key. Your public key can only be derived from your private key. Your private key cannot be derived from your public key.

  2. Public key cryptography can be used for encryption and signatures.

1 Like
  1. Public key is the address used to have bitcoin sent to your wallet, but does not allow access to said bitcoin. Private key is used to access and send bitcoin that’s in your wallet.
  2. Public key cryptography can be used for encryption or as a digital signature.
1 Like
  1. Describe the concept of public and private key with your own words. Private key is something your computer generates, a unique specific number for your key. Public key is derived from the private key. Never give your private key, only give public.
  2. What 2 use-cases can public key cryptography be used for? crypto transfer and private messaging.
2 Likes
  1. The public and private keys are like your identity cards on blockchain, it can be used in multiple situation on the internet like transferring data over public channels
  2. It is mainly using for Encryption and Digital signature.
1 Like
  1. Private key is a random number generated by the computer and cannpt be shared with anyone. A public key is generated from the private key, and other members of the network can know it.
  2. Encryption and digital signature.
1 Like

Data is sent through the internet or some other medium. PK cryptography is used for digital signatures and encryption. :slight_smile:

  1. Private key is a random number. With many many possibilities. And the public key is generated out of the private key.

  2. digital signing and encryption.

1 Like
  1. Private key, is a random number generated from a computer, and the public key is generated from the private one, the private has to be private because it defines a point of entry or output, the stable layer of communication, and the public is shared for eveyone to communicate with.

  2. to encrypt messages.
    to add a layer of security in a program.

1 Like