Homework on Public and Private Keys - Questions

  1. Private Key is yours only and only you know that number. Public key is public sharing meaning everyone in the network can see it. The public key is also generated into your public key

2 Encryption and Digital signature are two use cases used.

1 Like
  1. Through ECDSA a computer generates a private key and corresponding public key, these unique phrases allow for the encryption & verification of data; data being a message or transaction.

  2. Encryption and digital signatures.

1 Like
  1. Public keys are derived from private keys to send and open encrypted data
  2. Encryption and digital signature
1 Like

Describe the concept of public and private key with your own words.

Private key is a random number generated by your computer, in all usecases this is only used by you and cannot be disclosed to anyone else. Public key is generated from private key, and is for the public use as the name suggest.

What 2 use-cases can public key cryptography be used for?

It can be used for encryption and digital signiture.

1 Like

1. Describe the concept of public and private key with your own words.

The private key is a random number generated from the computer and a mathematical formula is used to generate a public key. The public key is accessible to anyone, however the holder of the private key is the only one who can decrypt the message encoded by the private key.

2. What two use cases can public key cryptography be used for?

The two use cases a public key is used for are encryption and digital signatures. BTC transactions are an example of digital signatures.

1 Like
  1. Public and private keys work together to achieve security and authenticity. The private key is a random secret code that only the owner knows. The public key is derived from the private key and it functions as an address for sending and receiving. The transaction is encrypted with public key when sent. The receiving end of the transaction can only view and decrypt the transaction with private key.

  2. Fund transfer and contract signing…

. .

1 Like

Txs on Bitcoin are not encrypted. A user signs a transaction with its private key to send it.

Both these examples use digital signatures. PK cryptography can also be used for encryption as you mentioned. :slight_smile:

1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a random long number generated by your computer when you open a new wallet. From this number a shorter public key is then generated. The public key is a function of the private key and hence the private key cannot be calculated by using the public key. The private key must be kept secret from everybody but you can share your public key openly with anybody.

2.What 2 use-cases can public key cryptography be used for?

The first use case commonly used in traditional computing as opposed to blockchain technology is encryption. If a sender wants to send a message through an open network to a receiver this message can be seen / heard by anybody hence this poses a problem is the sender and receiver don’t want the content of the message to be known to everybody. As such the sender of the message can use the receivers public key, which is a hash function of their private key to encrypt the message turning into gibberish. Once send the receiver can use their private key to decrypt and see / hear the message.

The second use case, more commonly used in blockchain technology is as a digital signature for which we can use Bitcoin as an example. If I want to make a transaction, using the Bitcoin network, I use my private key to ‘sign’ the transaction. All other computers, including the receiver, miners and anybody else who wants to view the transaction, can now use my openly available public key to confirm that the payment was made by the wallet with the same private key as was used to generate my public key. This is how transactions are confirmed through consensus and then added to the blockchain.

1 Like
  1. A private key is a random number (large) and the public key is derived from the private key, using a formula. The function only works in one direction private to public and can’t be reversed.

  2. Encryption and digital signature.

1 Like
  1. Public key is same as a username and private key is your password. So someone will use my username(bitcoin address) to send bitcoin and i will use my password(private key) to access my information.
  2. Email encryption and digital signature
1 Like
  1. Public and private keys are the basis of public key cryptography, asymmetric cryptography and cryptocurrencies and features:
  • to send messages through an open network and achieve confidentially and authenticity;
  • a public key has one private key and each private key has one public key (collision free);
  • private key is secret and allows user to access his/her data/cryptocurrency
  • private key can with an algorithm decrypt the retrieved message which was encrypted with the public key, which is the other key of the same pair with this private key.
  1. a. Encryption of messages using an individual’s public key and only be decrypted with the individuals private key.
  2. b. Digital signatures sign digital content with an individual’s private key and is verified with the individuals public key.
2 Likes
  1. Describe the concept of public and private key with your own words.
    Public Key is generated/derived from the Private Key. You can always go from private key to public key, but NEVER from public back to private. (one-way function) Private key is secret. Public key can be visible to anyone and can be used to encrypt messages which can only be opened with private key. If the private key is lost, it cannot be recovered. Anyone can use the private key if they have access to it.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital Signatures (Identify yourself and the sender of the message, provides integrity). Digital signatures are mostly used in BTC and allow you to compare the signature and public key to confirm where the message originated.

1 Like
  1. Private key is a random generated number and Public key is generated (hash function) from the private key.
  2. a. Sending an encrypted message over a public network.
    b. Digital Signature (from Private Key) - Public key is needed to verify that the message is signed with the same Private Key used to generate the Public Key
1 Like

Public keys and private keys are keys that are used to transmit information on a public network. The private key is a key only you should know. it is a randomly generated value and is used to create your public key. That public key is posted for everyone to see and use. When a transaction happens the sender uses you public key to encrypt the mesage for you. The receiver uses they priuvate key to decrypot the messgae. But the relationship is one way and cant be reversed to find out the users private key.

The public key is used to encrypt messages to be sent to a specific person. It is also used to verify a signature that someone has signed to a trasnaction or message.

1 Like

1 The public key derives from the private key. It’s calculated as a one way funktion there is basically no way you can reverse the calculation from public key to pricvate key.

  1. 1st Usecase is the encryption of messages.
    2nd usecase is creating a signature with your private key.
1 Like
  1. Describe the concept of public and private key with your own words.

Public and private keys are a great way of establishing trust between parties in a trustless environment. They are mostly used to validate the events in transactions that are inserted in the blocks. They are used to validate the transactions, since verification can be performed by anyone who possesses the public key of the generated public-private key pair. Anyone can prove the identity by owning the private key as the public key is generated from the private key but cannot be used to publicly identify the private key.

  1. What 2 use-cases can public key cryptography be used for?

The 2 use cases are for encryption and digital signatures.

1 Like
  1. A private key is a random number generated by a computer that is meant to be kept private. From that private key a public key is derived that is meant to be shared with anyone who wants to send you something.

  2. Two use cases for pubic key cryptography are sending encrypted messages, and also digitally signing messages to verify who sent them.

1 Like
  1. A private key is a random number generated by your computer which allows you to sign and send transactions across a network. The Public key is generated from your private key. The public key allows you to create address to receive transactions.

  2. Two use cases that a public key can be used for is encryption and digital signatures. If you want to send a message or file securely, you would use the recipients public key to encrypt your message or file. Then only the recipients private key can unlock the encrypted message. The public key is used in conjunction with a signed transaction to verify that message came from the private key.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is random number unique to the owner.
    Public key is derived from the original private key but made available to the public, it’s different than the private key but allows public to send but not take from original location.

  2. What 2 use-cases can public key cryptography be used for?
    to encrypt or use digital signature for messaging, email or sending / receiving bitcoin.

1 Like
  1. Public key is derived from private key. Private key is a large random number which should be kept secret and it is almost impossible to guess. Private key and public key pair are at the core of bitcoin network. Anybody can see your public key but you should only know your private key. Otherwise your btcs could be stolen. It is not possible to derive private key from public key.

  2. Encryption and digital signatures.

1 Like