Depends on what you mean by security. You can use encryption to secure your data or use the keys to login on a remote server without using a password or sign a transaction using digital signatures
- Describe the concept of public and private key with your own words.
Public Keys - you can give out to recieve payment
Private keys should be kept private so your wallet does not get hacked - What 2 use-cases can public key cryptography be used for?
to encrypt data and digital signatures
-
Describe the concept of public and private key with your own words.
Public Key is the string of address or key that is generated from private key and is shared with others. Public key is used as the verification of the owner/sender. Private key is as the secret key that belongs to the owner not to be shared with anyone else as a security. -
What 2 use-cases can public key cryptography be used for?
Digital Signatures and encryption.
-
Describe the concept of public and private key with your own words.
A public key is a number that is derived from the private key with the help of some complicated one way mathematical formula.The private key is a random number. -
What 2 use-cases can public key cryptography be used for?
Encrypt and authenticate a message and its sender.
- Your computer generates a private key, private key then generates a public key. It is a one-way-function. Public key can be seen by anyone. Public key encrypts information and private key can decrypt the information.
- The use cases are Encryption and Digital Signatures. So basically sending messages and sending money
-
Public key are keys generated from private key which can then be made available in the public space for other to see and use to send message securely to the owner of the private. Then private key is not a key to share, it is a key to be kept secret and should not be made known to anyone.
-
Public key cryptography are basically used for (a) Encryption and (b) Digital Signature
Beautiful! Thank you so much!
Homework - Public & Private Key Cryptography
Functions, Hash Functions, Cryptography
Describe the concept of public and private key with your own words.
Someone generates a long random number. That becomes the private.
S/he then runs the private key through a NSA function to get the public key.
The private key can generate the public key, But itβs impossible to use the public key to find the private key.
What 2 use-cases can public key cryptography be used for?
-
Encryption for sending messages
-
Digital signatures for sending messages
`.
-
Private keys are needed to generate a public key and are needed for anything you with to do with the public key. It is a one way mechanism where you can go from private -> public -> bitcoin address but it cannot go in reverse. And both things can be used if different ways.
-
Private and public keys can be used for encryption and for digital signatures.
- Encrypting a chat message
- Validating if a product is the actual product via a digital signature.
-
The private key is a secret key which only the owner knows. It ist used to encrypt or sign data. The public key can be used to verify the owner of a signature.
-
For encrypting / decrypting data and for signing / checking a signature.
-
The public key is derived from the private key and is one way meaning the private key can never be derived from the public key. Your computer generates a private key and through a series of formulas, the public key is derived from the private key. A public key can be shared with the public and signifies the address in which the sender is able to send funds while the private key should be kept private because whoever has knowledge of the private key has the access to your funds.
-
It is used to receive funds and authentication.
Both of these would utilize digital signatures to function. PK cryptography can also be used for encryption.
- Describe the concept of public and private key with your own words.
Public and private keys are pairs. a private key is a long random number, from the privete key you generate a public key which makes them a pair. Privet keys must be private, public keys are shared with everybody.
You sign a document with your private key and people can verify that it was you by checking the signature using your public key - What 2 use-cases can public-key cryptography be used for?
Encryption and digital signatrs
- The private key is a large random number used to cryptographically generate a public key. The private key must remain secret for security while the public key can be distributed freely. The public key can be used to decrypt data encrypted by the private key.
- Encryption and Digital Signatures.
-
a private key is generated from your wallet and its a secure phrase that is meant to keep your assets secure. the public key is generated from your private key and can be seen by watchers. it is ok for people to know your public key because they are unable to track it back to your private key.
-
encryption and digital signatures.
- Describe the concept of public and private key with your own words.
A private key is a very large random number generated by a computer. A public key is mathematically derived from the private key in such a way that the private key cannot be ascertained by merely knowing the public key.
- What 2 use-cases can public key cryptography be used for?
Encryption and Digital Signatures.
- Describe the concept of public and private key in your own words.
The private key is a very large random number held by a trusted/unique party, which is then used to derive a public key. The public key can be viewed by anyone; sharing it doesnβt jeopardize the security of the cryptographic function. The important part is that the private key generates the public key, but the public key cannot be used to generate the private key.
- What 2 use-cases can public key cryptography be used for?
Public key cryptography is useful both for encrypting messages and digital signatures.
1 - I use the public key to encrypt a message and the private key to unlock/decrypt the message and read it.
2 - It is encryption and digital signatures. Encryption is the way you make a message unreadable to everyone except the person the message was ment for. Digital signature is the way you identify yourself and verifys who has sent the message, it is used for btc transactions for example.
- A public key is for everyone to see and can only be generated from the private key. Private key>Public key. This process cannot be done backwards, cannot be reversed.
- Sending WhatsApp messages and cryptocurrencies.
- Public key is generated using a large number which is nearly impossible for anyone to regenerate the same private key.
Public key is a derivation private key.and cannot be done vice versus
2.public key can be shared with others so then can encrypt personal msgs which only u will be able to decrypt.