Homework on Public and Private Keys - Questions

  1. Private key is your random, computer generated individual unique key that only you (should) have. Public key is your key derived from the private key, that you can share with others, and use to send messages/information/transactions, which still would not allow access to your private key (where everything is held).

  2. Encryption and Digital Signatures

1 Like
  1. A private key is an incredibly long. random, and unique number chosen by a user when creating a wallet. That Number is then put through a hashing algorithm to get a unique encrypted public key that can then be shared and used to verify that a transaction indeed came from the holder of its intended private key.
  2. Encryption of data when sending messages and transactions as well as being used as signatures to verify the origin of data.
1 Like
  1. Pair used to encrypt messages or sign. Public is shared to everyone but private is only mine.

  2. Sign and encrypt messages.

1 Like

1 The private key is randomly generated, the public key is derived from the private key in a oneway function, which cannot be reversed to find the private key using the public key

2 Encryption in order to keep messages in a public communication channel secret
Signature of transactions in order to verify that who send a specific transaction

1 Like

1The private key its a random number created from my computer that is not public and nobody can sees it. A public Key is public number that everybody can sees it. Its a derived key from the private key wich means that only de owner of that key can read the message send to him.
2To send encrypted messages from one person to another, in the Digital Signature used in a wallet to send or receive cryptocurrencies.

1 Like
  1. Public keys are seen by everyone and can be encrypted into a private.
    Private keys are encrypted. The encryption can only be seen by one person (unless that person looses/leaks it). Also you cannot make a private key into a public key.

  2. The first use-case is the public key can become encrypted, which is usually generated by random number from your computer.

The second use-case is sending a digital signature. This allows other to see your unique encrypted key as a signature.

1 Like
  1. Public and private keys are hashes that unique cryptographic identifiers. Public key is derived from the private key and can be visible or shared with everyone.
  2. a )Sending a secret message. b) allowing transactions of bitcoin to happen
1 Like

A private key is generated by a random string of numbers. A public key is then created through a mathematical calculation using the private key. This public key can be seen by anyone and used to encrypt a message which only the person with the linked private key will be able to view. A private key can also be used to sign a message or transaction which the receiver can use the senders public key to verify that it was from the correct sender. A public key cannot be used to find the private key. It is a one way function.

Encrypting messages & digital signatures.

2 Likes
  1. Describe the concept of public and private key with your own words.
    A private key is a large random number generated to demonstrate ownership (unique) of an asset in the crypto space. A public key is generated from a private key. It can be used to decrypt messages and sign transactions.

  2. What 2 use-cases can public key cryptography be used for?
    The two uses public key cryptography can be used is for encryption and digital signatures.

2 Likes
  1. The purpose of cryptographic primitives is to create an encryption scheme. The scheme uses two mathematically related, but not identical, keys - the public key and the private key – as each key performs a unique function. The public key is used to for encryption and the private key is used to decryption. This encryption approach is beneficial for establishing secure communication/transactions over the internet since it is computationally infeasible to compute the private key based on the public key alone. Therefore, public keys can be openly shared, allowing individuals an easy method for encrypting content such as transactions and verifying digital signatures all while keeping their own private keys confidential, ensuring only the owners of the private keys can decrypt content and create digital signatures.

  2. Two use cases for public key cryptography could be peer-to-peer secure messaging or client authentication.

1 Like

Private keys are large random numbers and you can’t derive a private key from public key in any way. You can only get a public key from the private key. Which you can then use to encrypt or sign messages. :slight_smile:

  1. Public and Private Key Cryptography are interlinked mathematical concepts. Public being derived from Private, using a hash function. Since this unidirectional function creates a new, unique key, the public key that cannot be used to derive the private key, this key can be made available for its intended purpose to be public. This can then be used as a means of verification.
  2. The two use-cases for public-key cryptography are encryption where a public key can be decoded using a private key to uncover a message of some sort, and digital signatures, where the identity of an individual who sent a particular message can be verified.
1 Like
  1. Private key is a random and unique number that your computer generates.
  2. Encryption and digital signature.
1 Like

Thank you for a more transparent explanation of that. I made that more complicated than what it is. I understand more now.

  1. the public key encrypts a simple message,
    however the only way to decrypt it is to use the private key. The public key is derived from the private key.
  2. Emails would be an example, but also presume smart contracts as proof as to who signed it (digi signature)
1 Like

Oh derp, that’s the most obvious use case. I did mention signatures in the first answer, dunno why I put it there instead of on #2 though :slight_smile:

  1. Public key and Privat key is concept of matematicaly joined numbers pairs. You can derivate public key from private key but not in reverse direction. It is on way function. With public key you can verify that signiture come from private key owner. Second use case is that you can encrypt measage with public key and only owner of private key is able to decrypt it.
  2. Encryption and Digital signatures
1 Like

private key is used for generating a random number from which then is derived a public key. Later for example a message can be encypted with that earlier mentioned public key. A person from who public key was derived will be able to read that encypted message.

Key cryprography can bey used for encyption and for digital signature which is commonly used in cryptcurrency.

1 Like
  1. Describe the concept of public and private key with your own words.

A private key is a random number that identifies a person who owns it and keeps the information in it safe. These keys have to be saved in private because if someone else took it, they can see the information on it and can make transactions with that private key.

A public key is created from a transformation of the private key with a special formula. These keys are linked to each other but there’s no way to reverse the process made in order to obtain the original private key. Also this key has the characteristic that it can be published in a unsecure network without compromise the integrity of the private key where it was derived.

  1. What 2 use-cases can public key cryptography be used for?

The first case that a public key can be used is for encrypting a message to someone else in order to send it through a public unsecure network. Once that message is encrypted using the public key of someone, just the person who owns the private key linked to that particular public key can have access to that message.

The second case of use of a public key is to verify the provenance of one message or transaction. This process can be done through comparing the sign, created from one private key that is also linked to the message, and the public key linked to the private key. The verifying process needs to compare through a mathematical way if the sign and the public key match between them in order to identify if that transaction or message is from the person who signed the message.

1 Like
  1. Private key is unique, it is known only by yourself. Public key can be ready by the public but can only be decipher by the private key.
  2. send money and decipher a message.
1 Like