Homework on Public and Private Keys - Questions

  1. Describe the concept of public and private key with your own words.
    Private and public keys are elements of cryptography used in BTC to send and receive BTC

  2. What 2 use-cases can public key cryptography be used for?

  1. encryption
    2)digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.
  • A public and private key are at the core of the cryptocurrency and blockchain industry. The only way to generate a public key is with a private key (random number) and nobody can have access to this public address afterward except the owner of this private key, it is a unique key is a one-way function.
  1. What 2 use-cases can public key cryptography be used for?
  • The 2 use-cases of the public key cryptography are Encryption and Digital signatures in other words messages or funds.
1 Like
  1. Describe the concept of public and private key with your own words.
    At the very basic level private key is just a random number. Private key in cryptography is something that should be kept secret because if others see it they can steal your “identity” (they can send messages with your signature) or they can do transactions with your cryptocurrency. Public key is generated from the private key and is intended to be seen by everyone. Others can use your public key to verify your encrypted messages or signatures. There is no way to figure out the private key by using the public key.
  2. What 2 use-cases can public key cryptography be used for?
    For encryption and for digital signatures.
1 Like
  1. Public and private key are used to send, receive and get access to your fund.

  2. Public key can be used to receive funds and to verify the sender

1 Like

this are the use case, try to describe it.

2 Likes

1: A public key is derived from your private key that can be seen by anyone and is used to encrypt, the private key is only used by you and is able to decrypt those messages

2: Encryption and Digital Signatures

1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is used to encrypt sensitive information that can only be decrypted by the private key. Without the private key, you can not send bitcoin transactions as it’s required to be signed by it.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital signatures (Identity integrity) used to send bitcoin transactions.

1 Like
  1. Describe the concept of public and private key with your own words.
    The concept of Public and Private keys are to provide encryption of information or data as well as the decryption of such information or data. Such keys are also used for digital signatures which is essential in the world of crypto.

  2. What 2 use-cases can public key cryptography be used for?
    Public key cryptography is the core of crypto. This key can be used to confirm the transfer of bitcoin from peer to peer or to verify the digital signature of a specific transaction ordered or requested keeping the blockchain safe and secure.

1 Like
  1. Private keys give me access to my data but keep others out. Public keys verify my identity to others and help me control who seems my data.

  2. Obviously, cryptocurrency wallets use both keys. Private to control your funds and public to transfer funds. Encrypted emails also use both keys.

1 Like

1)Describe the concept of public and private key with your own words.

Private key (rundomly generated by computer) is only for me, used for openimg messages meant to me and also I identified/sign my messages I sent.

My Public key (deriv. fro. Private key) is available to any one, used to designated that is for me and only I can read it.

Also when I send message the other side can use my Public key to verified, that is for me because I sign it with Private key from which the Public K. is derived.

2)What 2 use-cases can public key cryptography be used for?

-encryption
-digital signature

1 Like

A private key is created randomly and generates a public key. It is not possible to calculate a private key from a public key therefore it can be shared in the public. Only the holder of a private key is able to verify the integrity of an digital asset onto which the public key was applied.
Encryption (e.g. of emails) and digital signature

3 Likes
    1. The private key consists of randomly generated numbers. This is the “key” to your funds. You use this to sign transactions. This key should always be kept secret. The private key is used to generate a public key, which in the case of Bitcoin is used to generate the Bitcoin address. When you receive funds to this address, they are linked to your account, as your private key was used to generate the BTC address.
    1. Public key cryptography can be used to a) sign transactions and b) encrypt communication.
    • a. Signing works by using the private key to sign the message. The recipient then uses your public key and the signature to verify that you were the sender.
    • b. Encryption works by generating a public key from the recipients private key. The sender then uses this public key to encrypt the message. Now only the recipient, using their private key, can decode the message.
1 Like
  1. Describe the concept of public and private key with your own words.
    Public/private key pairs enable the safe and verifiable transmission of messages between two parties and prevent people/sytems from being able to read those messages.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption – to send private messages between two parties. A public key is shared by the receiver, the message is encrypted with the public key by the sender, the receiver decyrypts the message with the private key.
    Digital Signatures – to sign a transaction or digital document of some kind. It is signed with the private key and verifiable with the public.

1 Like
  1. Private key is a random large number that should be secret and from which you can generate public key that you can shere (public key is derived from private key). It is impossible to reverse this process (to get private key from public key)
  2. You can used it to encrypt something and to digitally sign a file (verify the file origin)
1 Like
  1. Private key is a random number generated from a computer/user. It is its own “ID online” for the purpose in hand, so its important to keep it to yourself. Then with that random private key user can generate public key for everyone to see( process is not reverseable ).

  2. Encryption( privacy protection ) and Digital signatures ( Identity verifying, transactions verifying )

1 Like

1.The private key is a random generated number that should only be accessible by the owner that can create a public key that makes a message unreadable to anyone who doesn’t have the private key.
2. Encryption and digital signature

1 Like

private key is the core for public key and crypto wallets.
key can be used for decryption, encryption and digital signatures verifications

1 Like
  1. Describe the concept of public and private key with your own words.
    A private key is a random number generated by the computer, for example, when you create a new BTC wallet. Private key should be kept a secret by the owner, since it enables you to decipher transactions sent to you via Public key. Public key is generated from a Private key and is publicly available.

  2. What 2 use-cases can public key cryptography be used for?
    The two uses are encryption and digital signatures.

1 Like
  1. Private key number to generate a public key.
  2. Public Key - is a number that is available to everyone so that they can verify that the transaction or message they recieved was sent by the orginal sender and not a third person.
  3. Encryption and Digital signature.
1 Like
  1. Describe the concept of public and private key with your own words.
    The public key is you public tag that you share to allow others to use it to encrypt the messages they want to send you or that you give to others so they are able to verify that your message was actually signed with your private key
  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signature
1 Like