Homework on Public and Private Keys - Questions

  1. A private key is a random number secure id number. Public keys are generated off the private key. Your private key is the only thing that can decrypt messages from your public key.
  2. Public keys can be used to encrypt messages you are sending and to create hashes to create a bitcoin address
1 Like

1)the private key is a random number generated by your wallet, it is the “key” to your funds. It is the one used to sign transactions.

2)The public key is derived from the private key and is the one we share with our recipient so that the message they are sending us can be encrypted and only read by me, since I have the private key.

1 Like
  1. A private key is a randomly generated mathematical signature, which begets the public key.

  2. Sending sensitive information, and verifying sensitive information.

1 Like
  1. Describe the concept of public and private key with your own words.
    • A private key is a set of randomized numbers that is generated for only you to use to decrypt messages. The public key is then generated from the private key. You use the public key for everyone to see in order for them to send you an encrypted message to your private key.

  2. What 2 use-cases can public key cryptography be used for?
    • Public key cryptography can be used for sending encrypted messages.
    It can also be used for sending digital currencies.

1 Like
  1. Private Key is your own personal key, Public Key can be viewed by everyone, public can be used to verify transaction matches with the private key.

  2. Encryption of files and messages and Digital Signatures for transactions.

1 Like
  1. Describe the concept of public and private key with your own words.
    A private key generates a public key. The public key can be used for encription or signing. The private key for decryption and verifying the signature.
    It is a concept of unidirectional key system.
  2. What 2 use-cases can public key cryptography be used for?
    For encryption and signature.
1 Like
  1. Private key is your privacy and safety, and with it you can receive messages or transactions that only you can see or use, in order to do that, people can see your public key.

  2. They can be used to send transactions or messages.

1 Like
  1. public and private keys are used to encrypt and decrypt messages

  2. Two use-cases for public key cryptography are to send encrypted messages and provide identity via digital signature

1 Like

A private key is like a users receiving account where users can see/read the received data/information that has been sent to them. The public key is the users address where the other party sends these data/information to.

Can be used for i) financial transactions (sending/receiving cryptocurrencies) on crypto exchanges; and ii) sending text messages via encrypted chat/text apps (WhatsApp for example).

1 Like
  1. Public and private keys are two very big numbers. And these numbers connected to each other.
  2. You can use anyones public key to encrypt some data in result only private key owner can decrypt and read that data. Also you can create signatures using your private. Other people can look at your signature take your public key and check it is really you who created that signature.
1 Like
  1. A private key is a large, random, computer generated number. If you use a private key as the input of a suitable encryption algorithm, the output can be considered to be the corresponding public key.

(a.) If you want to send data across a public network you could use a private key to create a digital signature to show the recipient that the data was not altered and also to verify your identity to them. The data along with the digital signature is sent and as long as the recipient has access to the corresponding public key, they can verify that the message came from you and that its integrity has been maintained.

(b.) Public key cryptography can also be used to encrypt data so that only the desired recipient can decipher the encrypted data. In this case the data is encrypted using the recipient’s public key and can only be deciphered by the recipient by using the corresponding private key.

2 Likes
  1. Private key is a random number that is generated for a user in different cases such as when opening a crypto currency wallet. Private key is completely unique, meaning that in practice there is no chance that your generated private key already exists. A user doesn’t have to and should not share private key anywhere. Public key is generated from private key using one-way functions, so private key can’t be solved by using the correlated public key. Public key can be safely shared over the internet. Public key’s relation to a specific private can be mathematically confirmed.

  2. Encryption and digital signatures. In encryption a sender can encrypt a message with receiver’s public key so that the only way to decrypt the message is using the receiver’s private key. In digital signature case, data can be signed with sender’s private key in such way that the receiver, using the sender’s public key, can confirm the sender’s identity.

1 Like
  1. Describe the concept of public and private key with your own words.

Imagine a mailbox on the street. Everyone knows its location. The location of the mailbox is completely public, anyone who knows the location can mail you a letter. But only the owner of the mailbox can open it and read the letters. The owner uses the private key to open the mailbox.

Public keys can be exchanged but if you want to unlock a document or a wallet you need the private key. In Bitcoin for example, private keys are used to sign transactions.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures. Public keys can be used to encrypt data and only the matching private key can be used to decrypt it. Even though the keys are linked together they cant be derived from each other.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is a set of random numbers. With private key a public key is created that generates a digital signature. Public key is for transacting. Private key is needed to access the transaction. Private key is only for you.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signature

1 Like
  1. Describe the concept of public and private key with your own words.
    Private Key can generate the Public Key, which in extent it can be posted and distributed publicly in order to make the data or transaction securely encrypted. It is a one-way process as from Private Key we can go to the Public Key, but not backwards.

  2. What 2 use-cases can public key cryptography be used for?
    The 2 use-cases of Private and Public Key are Encryption and Digital Signatures. Talking about Bitcoin and Cryptocurrencies in general, the above 2 concepts have application to the Digital Signatures.

1 Like
  1. These are randomly generated numbers used to decrypt and encrypt information.
  2. To send an encrypted message or to create a digital signature to ensure the identity of the sender.
1 Like
  1. Public and private key is an encryption function that able a group of people to share data in privet

  2. For data and digital signatures.

1 Like
  1. Public and Private keys are used in cryptography- for either encryption or digital signatures.

A Private key= unique, random number generated by your computer.
It is to be kept secret- used for receiving transactions and decrypting sensitive information (which it received from the Public key).

Your Public key is derived from your private key- which is accessible to anyone in the world.
It is used to send sensitive information to other specified public keys.

Note: you need your private key to access the information and to decrypt it.

  • this system = one-way function; you cannot derive a private key via the corresponding public key.
  1. Encryption and Digital Signatures
    Encryption - done in order to send sensitive information on a platform with many spectators
    Digital signatures- used for identification; to test integrity and verification.
1 Like
  1. private and public key pairs are used to enable private and secret transactions over public spaces
    private keys are generated via random numbers on your computer. the public key is derived from the private key and can be shared anywhere while the private key is the keys to the kingdom so to speak
    always keep private keys secret and secure
  2. public keys can be used for digital signature as well as encrypting messages
2 Likes
  1. Describe the concept of public and private key with your own words.

A private key is a set of numbers that only the owner knows; a public key is created from the private key and can be safely shared with others.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures

1 Like