Homework on Public and Private Keys - Questions

Keep your private keys secret because they are your BTC or other.
Public keys/ addresses are used for making transactions and adding that layer of security.

It can be used for digital signatures or encrypting.

1 Like
  1. Public key is generated from a computer generated Private key that the individual generates. You can go from private key to private key but not vice versa.
  2. Generate bitcoin addresses and send private messages
1 Like
  1. A public key is like your house address, i can send mail there, I can go to the front door.

A private key is the key to the house, (technically) I can’t enter the house and access the property in there unless I have the private key to the front door.

  1. Encryption, Digital Fingerprint /s signature
1 Like
  1. Describe the concept of public and private key with your own words.
    These are security elements that provide a means of securing and securely transferring ownership of items contained in the blockchain.

  2. What 2 use-cases can public key cryptography be used for?
    It is a construct that creates both an address on the blockchain as well as a security mechanism for accessing or authenticating an actor.

1 Like
  1. A private key is a random computer-generated number. A public key is an output of a specific equation using the private key that is unidirectional, allowing a public key to be shared without exposing the private key to vulnerability.
  2. Encryption and cryptocurrency
1 Like
  1. private key is generated by my computer as a secret and then give public key which others can see.
  2. Encryption and digital signature
1 Like
  1. Describe the concept of public and private key with your own words.

Private key is your secret key, you are the only one that knows it. Private key can be used as a signature, or for encryption.

Public key is generated by private key. This is the one you share with others.
It can allow to Check that signature is generated by the private key that creates the public key associated to the signature. It can also to decrypt message.

  1. What 2 use-cases can public key cryptography be used for?

Digital signature
Encryption

1 Like
  1. Describe the concept of public and private key with your own words.

The public key is generated by the private key via encryption. You can access the public key if you have a private key but you cannot access the private key by having the public key. The public key is accessible by anyone and it generates the BTC address.
You need the public key do be able to digitally sign a transaction from a public key.
2. What 2 use-cases can public key cryptography be used for?
Encryption and digital signature

1 Like
  1. Describe the concept of public and private key with your own words.

One way hash algorithm that verifies or unlocks the information being sent. Private Key validating the Public Key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and Digital Signatures

1 Like
  1. Describe the concept of public and private key with your own words.

Public key and private key are used in cryptography to encrypt and decrypt messages.
Private key is a random number using which a public key is derived.
If a person wants to send a message over unsecured network he can
encrypt message using a public key published by recipient which is
actually derived from the private key.
The encrypted message can only be decrypted by the recipient who has the private key.
Also it can be used to digitally sign a message.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and Digital signature are two use cases used.

1 Like
  1. Private key is something that only the user who’s ‘account’ it is, which allows only them to spend their money and do confidential things, while public key is derived from the private key, but allows other users to interact with it.

  2. Public key can be used to encrypt messages to prevent a third party from seeing, and cryptocurrency’s security.

1 Like
  1. Describe the concept of public and private key with your own words.
    A private key is a very large random number that is generated locally by the system.
    A public key is created with a mathematical algorithm, based on the private key.
    The private key is kept secret, the public key is visible to everyone.
    There is no way to reverse calculate the private key from the public key.

  2. What 2 use-cases can public key cryptography be used for?

  • Message Encryption (not used in bitcoin)
    The public key of the message receiver is known by the message sender. The sender encrypts the message with the public key of the receiver. The encrypted message can’t be read by 3rd parties. The receiver is able to decrypt the message with the private key to read the original message.

  • Digital signature
    The transaction gets signed with the private key of the user.
    Other participants in the network are able to check if the digital signature is generated by the same private key that also creates the public key.

1 Like
  1. Describe the concept of public and private key with your own words.
  • The concept of public and private keys are to keep security and trust between transactions. The private key is generated as a decryption or signature in order to validate the public key.
  1. What 2 use-cases can public key cryptography be used for?
  • The two use-cases public key cryptography can be used for are encryption and digital signatures.
1 Like
  1. Describe the concept of public and private key with your own words.
    A private key is a random series of numbers and letters that are used to generate a public key. The public key provides others with an address to send data/funds across the public blockchain. People can see your public key, but the ownership associated with your public key is still safe. People should NOT see your private key, as this is the key used to decrypt and “own” anything that is sent to your public key. Once someone knows your private key, they “own” whatever is associated with your public key.

  2. What 2 use-cases can public key cryptography be used for?

  • Data encryption
  • Digital signatures
1 Like

You can verify the sender of the message and it can also be used for encryption. :slight_smile:

Crypto transactions utilize digital signatures to function. PK cryptography can also be used for encryption. :slight_smile:

It can also be used for encryption. :slight_smile:

1 Like
  1. Describe the concept of public and private key with your own words.
    Public key is using for sign you message or recieve money. It can be show for everyone and can not be able combinate privat key, because it’s pretty random. Private key is using for decrypt massage or to manage your money.

  2. What 2 use-cases can public key cryptography be used for?
    Public key may in twitter for donation :sweat_smile:
    Or send encrypted message

1 Like
  1. A public key is a unique key based on a randomly generated Privated Key. A public key is used in public and is visible everywhere, it can be used to send encrypted messages.

  2. it can be used for Encrypted messages or Digital Signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    A public key is unique key based on a private key and with the public key its now possible to send encrypted messages which then can be decrypted with the private key.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption or Digital signature.
1 Like