Homework on Public and Private Keys - Questions

  1. Describe the concept of the public and private key with your own words.
    -A private key is generated by computer, is a random number, that you must keep for yourself. Who has the private key, is the owner of the cryptocurrency.
    -A public key is derived from a private key. As the name shows that the key can be shown to the public

  2. What 2 use-cases can public key cryptography be used for?
    -The first usage is encrypted messages which men send to others.
    -The second usage is to use as a digital signature. It is also more common
    used in cryptocurrency to sending the coins.

1 Like
  1. Private key( is a random number generated, and the public key is a number generated from the Private Key. The public key can be distributed to all the computer in the network, as the Private Key should not. An who has the Public Key can validate if the sender of a message is really the person that has the Private Key. Like Hash256, it is a one-way function, meaning that from the Public Key you can’t find out the Private Key.
  2. Can be used as Digital Signature to make sure the sender is really the person you are expecting. And for encryption/security purposes, where you encrypt the message being sent and only the person with the Private Key can decrypt it.
1 Like
  1. Answer: . public key is gernerate from the private key. the public key is like a adress where datas can be send so everbody can see the public key. the private key is the key to decrypt the information whos been sended to you

  2. Answer: to send data from a to b like an address.
    or for verification

1 Like
  1. The concept of public and private key is the backbone of encryption , it allows users to send send and receive secret messages in an unsecure network.

  2. Public key cryptography can be used for : 1. Encryption and 2. Digital signatures .
    like in the case of cryptocurrencies and insurance contracts .

1 Like
  1. Public and private keys are encryption tools used for security purposes. From the private key, by hashing a unique public key can be created. The public key can not be used to know the private key. Only you can make use of your private key to decipher data that has been encrypted with your unique public key. Your private key is also used to sign a message after which the receiver checks if the messenger is really the one sending the message via the signature and public key.

  2. Encryption of data and digital signatures.

1 Like

-Private key is set of random numbers, the public key is generated from private key numbers.
-digital signature and encryption

1 Like

The private key is a very large random number. From the private key a public key is being created. Public key then can be put on your blog or on your Twitter account. However, nobody can go back to your private key since itā€˜s a very large number.

  1. Encryption: When Alice wants to send an encrypted message to Bob she can do so when encrypting her message with the public key from Bob. He then can de-crypt Aliceā€˜s message with his private key to read this message.

  2. Digital Signature: Alice wants to send a signed message to Bob. She does this with her private key and signs it. Bob is then able to verify with Aliceā€˜s public key that this message has been sent by Alice. So he compares the public key vs private key and can then verify that itā€˜s from her.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is only known and visible to the holder of an address/wallet.
    Public key is generated from a private key and could be seen to anyone on the network, but it could not be used to generate the private key back. It insures the security and anonymity of the holder.

  2. What 2 use-cases can public key cryptography be used for?
    Public key cryptography has two uses: 1.Encryption of messages 2.Generating digital signatures.

1 Like
  1. For information to be transferred securely using a public server there must be a method of ensuring that the data remain private. By using a public key that acts as an address that can be used universally within the public space, data can be sent between parties. This public key is a ciphered derivative of a personal private key, the private key is a random string of values that is needed to unencrypt the data received through a transaction. It should remain secured to avoid any malpractice.
  2. The combination of these two keys can be used successfully in two useful capacities in cryptography, one being encryption, and the other, digital signatures. With the case of encryption it is possible to use the public key to encrypt the data sent and the private key is then required to unencrypt. In the application of digital signatures it can be used to implant a digital fingerprint onto data, the private key is used to essentially sign the data to be sent, the receiver can then correlate the relationship between this signature and the public key associated with the sender and verify the transaction.
1 Like
  1. Public and private keys are used to safely transfer information through a public medium (encryption) and to sign messages and transactions so that the recipient can validate you identity/the integrity of the message (digital signature).

  2. Public key cryptography can be used for encrypting data and sharing it through a public medium, and digitally signing messages and transactions.

1 Like

Homework on Public and Private Keys
1- public Key is acting as your address where it public and anyone can have and they can encrypt messages sent to you using your public key and it is linked to your private key, the private key is your own key which is not shared with anyone and used to decrypt a message that encrypted using your public key
2- they are used for Encryption and digital signature.

1 Like

1. Describe the concept of public and private key with your own words.
It simple allows to send encrypted information in an unsecured area. How it works?
First of all there is the private key. With this you generate your public key. You can share now your public key to the audience
You can also sign your message with your private key. Which add a signature to your message which the receiver can identify as a message from yourself.

2. What 2 use-cases can public key cryptography be used for?
Simple said encryption and digital signature

1 Like

.1. Public and private keys enable users to send data over an unsecured network. These keys are used in such a way that you can use the public key to interact with the world. Moreover, the private key is used to protect your address. Note* A Private key must be only known by the owner.
2. Public key cryptography can be used for the 2 following use-case

  1. Encryption- where the public key is used to send an encrypted message to and the private key is used to solve the message.
  2. Digital signatures: , where the private key is used to sign a message made through the public key.

Please correct me if im wrong with my answers.

1 Like
  1. Describe the concept of public and private key with your own words. A private key is a random number and a public key is a value generated from the private key. The public key can be used to verify that the source of data came from the holder of the private key, but the public can’t be reverse engineered to figure out the private key.

  2. What 2 use-cases can public key cryptography be used for? Encryption and Digital Signatures

1 Like
  1. Each wallet contains a private key and a public key. The public key is derived from the private key and is visible to everyone on the network . The private key is secret and is used for digital signatures when sending and receiving messages. In a transaction, the digital signatures verify that the Sender of the message is the owner of the 1st public key and that the Receiver of the message is the owner of the 2nd public key.

Without the private key, the transaction can not be sent or received because the owner of the public key can not be verified

  1. Digital Signatures and Encryption
1 Like
  1. Private key is the key that I have and I keep secret. I generate a public key from my private key. I send the public key to everyone else. Other people use my public key to encrypt their message. As I am the only one with my private key, only I am able to understand the message.

  2. There are 2 common use-cases for where public key cryptography can be used for. First is for transactions with cryptocurrencies and second is the ability to sign documents or emails to make sure they are coming from the real person.

1 Like
  1. Describe the concept of public and private key with your own words.
    The private key is a random number to be kept secret by the user and the public key is a number generated from the private key. The public key is safe to share freely since the private key is impossible to work out from the public key.

  2. What 2 use-cases can public key cryptography be used for?
    The public key can be used for encrypting messages or to verify a digital signature

1 Like
  1. Describe the concept of public and private key with your own words.
    Public key is a unique digital address that is shared in public.
    Private key is a digital ID that can be used to decrypt the public key and create signature for authorization and verification

  2. What 2 use-cases can public key cryptography be used for?
    Encryption dan Digital Signatures

1 Like

1.)
Private Key: My personal insurance which I can use to generate a public key to communicate with the world.

Public Key:
My Adress which is visible to everyone and used to communicate with me.

2.)
Encryption: Send a secret message through a public space.
To make data which is shared by 2 systems inaccessible and unreadable for strangers or even an administrator.

1 Like
  1. Public key is a publicly visible reference to something or someone or location. A private key is the unique key that is able to view / open / decrypt something that has been sent using that publicly viewable key.

  2. Public key cryptography can be used for sending encrypted messages and for digital signatures, i.e. as verification of the sender. The digital signature use case is what’s used in BTC transactions to verify the sender.

1 Like