Homework on Public and Private Keys - Questions

1.A private key is your own personal key that you need to keep a secret and safe, with this you can create a public key which you can share or post anywhere.
People that want to send you secret messages can use your public key to encrypt a message send it to you which you can decrypt with your private key.
2.Encryption and and digital signatures

1 Like
  1. A public key it’s open for the world to see and it is used to encrypt data. A private key it is used to maintain the data private, and it used to decrypt the data.
  2. It is used for encryption and digital signatures. The most obvious application of a public key encryption system is for encrypting communication to provide confidentiality.
1 Like
  1. The concept of the public and private key are public keys can be sent and just require verification and signature. A private key has encryption and more secure from being vulnerable to read through digital wallets.
  2. The 2 use-cases can be used for authentication, SSH, and more.
1 Like

1
A private key is used to sign a transaction (Digital Signature) as well as creating a public key, and a public key is shared with others for them to send you encrypted messages.

What 2 use-cases can public key cryptography be used for?

2
Encryption
Encrypted messages (e.g sending and receiving emails)

Digital Signatures
To verify (digi sig.) the bitcoin address of a wallet

1 Like
  1. The Private Key is the code generated by your computer in order for you to keep information private. The Public Key is the code created by you using your private key, and is given out publicly for those that need to send you encrypted information. It is checked against the private key in order to view the protected information.

2.Encryption and Digital Signatures

1 Like
  1. Describe the concept of public and private key with your own words.

A Private Key is a randomly generated number that is kept secretly and is use as a private identifier. This number is hashed to generate a number (public key) that can be given out to the public.

  1. What 2 use-cases can public key cryptography be used for?

1 - encryption of messages like encrypting an email.
2 - unique digital signatures

1 Like
  1. private key is randomly generated by your computer and which a public key is derived from. The public key cant derive a private key. Private key is only stored by owner and public key is shared .

  2. encryption and digital signature.
    A sender will encrypt a private message with the recipients public key and send it over an insecure network. The receiver can then decrypt the message using his private key.
    digital signature is when a sender signs a message with his private key and the recipient can verify the sender by his public key.

1 Like
  1. Private and public keys are paired. Each are a long random number. Only i (should) have access to my private key but my public key can be shared with anyone. Public key is used for encryption and the private key is used for decryption.

  2. Encryption and digital signatures

1 Like

Public Key is a set of numbers derived from a Private Key. Since this is linearly derived, the Private Key cannot be deduced. This makes encryption and identification possible.

Public Key cryptography, therefore can used for encrypting messages and verifying sender of, say Bitcoins.

1 Like
  1. The public key is generated from your private key, it is shared with others to encrypt their messages to you. The private key is a unique random number that only you have, It identifies you (digital signature).

  2. Two use-cases of public key cryptography are message encryption and digital sigmatues.

1 Like

1. Describe the concept of public and private key with your own words.

Private and public keys has many applications like data encryption, identity verification and integrity of particular messages. The main concept is to verify that the information sent across the network between two individuals can only correspond to them.

2. What 2 use-cases can public key cryptography be used for?

When sending messages across the network public keys are useful for the encryption of these messages which then can only be decrypted by the private key that generate it. Another case is to verify the identity of the sender. After the sender signs the message with his private key, then te public key will be used to verify that it was created by the same private key.

1 Like
  1. Describe the concept of public and private key with your own words.

Private key is generated by your computer, and it stays private, one can generate a public key from a private key.

  1. What 2 use-cases can public key cryptography be used for?

For encrypting messages, and digital signatures.

2 Likes

Private key is randomly generated by your computer (should be kept private) and public is is derived from private key, but public key can be shared with anyone. Additional layer of security is the address.

2 uses is for encryption and for digital signature = verification genuine.

1 Like
  1. The private key is a large random number generated by the user’s computer. From the private key people can generate a public one. The public key is an encrypted private key. This is done through one-way specific formula.
  2. 2.1 Encryption
    2.2 Digital Signature
2 Likes
  1. Public key matches only private key it was generated from. A public key used for encrypting data, private for decrypting.
  2. For encrypting and digital signatures.
1 Like
  1. Private key is generated random large number. Public key is generated out from privet key. Private key is used to decrypt data encrypted with public key. Only the private key which generated particular public key can decrypt its encrypted data.

2 Encryption data transferring and digital signatures

1 Like

Actually the main purpose for using addresses instead of private keys is to save on storage. Public keys are 65 bytes long and addresses are only 20 :slight_smile:

  1. Private key is the random number that is generated on your computer. Public key is generated from the private key. Public key is shared with others. They encrypt message with that public key. You keep your private key secret because only this private key can decrypt the message. If someone gets your private key they can decrypt (read) the message too. Private keys are also used as the digital signature.

  2. Encryption and digital signature

2 Likes
<i>Describe the concept of public and private key with your own words.</i>

private/public key pairs have the following properties.
Both are large prime numbers
The public key can always be recovered from the private key
The private key can never be recovered from the public key.
Private keys can be used for encryption and generating digital signatures. Public keys can be used for encryption and for verifiying digital signatures.

What 2 use-cases can public key cryptography be used for?
1 Encryption
Encrypting plain text using the public key and decrypting with the private key. For example when sending a message via email that needs to be encrypted the sender will use the public key of the recipient’s private key to encrypt the message. The recipient will then decrypt it with their private key. The public key is well known and public (hence the name!)
2 Digital signatures
Digital signatures are used in computer science primarily to prove that a message sent by alice to bob has not been tampered with and that it was in fact sent by alice. The signature can be generated using a symmetric key (eg HMAC-SHA256) or using a private assymetric key (eg ECDSA or RSA-256).
Digital signatures are used in bitcoin in order to sign transactions. The transaction includes the signature generated by the private key, the public key of the signer and a reference to a transaction on the blockchain containing some UTXO that has been sent to the bitcoin address corresponding to the public key in the current transaction.
During verification the signature will be used together with the public key to verify that the output refered to in the signed transaction can be spent by the entity in possession of the private key that was used to sign the transaction.

1 Like
  1. Describe the concept of public and private key with your own words.
    A) Allows people to send encrypted messages through an open network channel. The public key is derived from the private key (random number). You can’t take the public key to access the private key.

  2. What 2 use-cases can public key cryptography be used for?
    A) Encryption and digital signatures.

1 Like