Homework on Public and Private Keys - Questions

To have a public key you must have a private key. It is a unique, random, computer made key that is given to you when you obtain a wallet. Public keys are linked to your private key as well as your bitcoin address

encryption and digital signatures

1 Like
  1. A private key is a randomly generated number made by your computer which is only known and accessible to you. A public key can then be derived from this private key and is visible and accessible by anyone on the network. Person A can encrypt a message using a public key and the only way to decrypt this message would be by using the private key that derived the public key used.
  2. Digital Signatures and Encryption/sending encrypted messages.
1 Like

Thank you! :slight_smile:

1.	Describe the concept of public and private key with your own words.  

Ones computer generates a private key (unknown and unseen by anyone other than the owner) and from this private key a public key (visible to the public) is developed and it is this public key that is used to send and encrypt data. The private key receives and decrypts the data
2. What 2 use-cases can public key cryptography be used for?

-Encryption -Digital Signatures

1 Like
  1. Describe the concept of public and private key with your own words.
  • A public key is derived from a private key through a special formula which means whoever has access to the private key also has access to the public key. However it is not possible to obtain the private key through the public key.
  1. What 2 use-cases can public key cryptography be used for?
  • Encryption & digital signatures
1 Like

Homework - Public & Private Key Cryptography

[Functions, Hash Functions, Cryptography]

Describe the concept of the public and private key with your own words.

Public keys are for the public to see. They are derived from the private key in which is never to been seen in public since it gives access to your wallet.

What 2 use-cases can public-key cryptography be used for?

There is encryption = This is used majorly in communication and not its cryptocurrency.

Number two is used in cryptocurrency. It has to do with verification of sender, and it uses signature verification.

1 Like
  1. Public key is available for everyone to see, and it can be use to encrypt the messages to be send to you(being the owner of that public key) and then only your private key can decrypt the public key-encrypted message. Private key should not be shared with anyone, other wise your account is no longer secure you can use the private key to generate a public key and also create digital signatures.
  2. Encryption and Digital signature
1 Like

1. Describe the concept of public and private key with your own words.
The private key is a randomly generated key, this key will be used as signature to verify for example transactions.
The public key will be created mathematicaly from the private key but there is no way to go vise versa.
Public keys can be shared with everyone and are there to encrypt data, the encrypted data can be decrypted by the associated private key.
2. What 2 use-cases can public key cryptography be used for?

  1. Digital signatures
  2. Encryption
1 Like
  1. The public key is the key that you can send and post for everyone to see.
    The private key is the key that only you should have access too and is to never be seen or know by anyone.

  2. First use case, Sending encrypts message use the public key of the recipient.
    Second use case, digital signature of a message.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is a very large random number generated by a computer and a public key is derived from your private key.
    You cannot reverse engineer the public key back to the private key.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and Digital signature

1 Like

1. Describe the concept of public and private key with your own words.

A private key is a unique and totally personal numeric password generated by a computer to protect our information (wallet, message, transaction, etc).
This couldn’t be decorated or re-generated in case of loss.

A public key is a derivative of the private key but, is necessary to operate with other people, this could be shared with the public to check the authenticity of each transaction under your name (or wallet).

2. What 2 use-cases can public-key cryptography be used for?

  • Encryption and Digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.

Private key is a mathematical code generated by a computer and is singular, as there won´t be any other similar code to this one. This code generates another code, a public key, which is used in many applications and programs the owner of the computer uses. With this public key you can get encripted messages from other people, but noone will ever get to know your private key starting from your public key.

  1. What 2 use-cases can public key cryptography be used for?

Encription and digital signature.

The public key of the receiver can encript a message from somebody else. For this, the sender needs to know the encription method the receiver uses, therefore the key must be public.

You can put your digital signature in any message of your own with your private key. Then the receptor who knows your public key will verify that the digital signature from your private key and your public key are compatibles. If they aren´t, the message is not yours.

1 Like
  1. In cryptography, your private key is essentially your password that is needed to access your cryptocurrency. A private key can turn into a public key in order to send messages or bitcoin but you cannot reverse it and find out somebody’s private key using the public key. A private key is unique to you and is virtually impossible for someone to have the same private key as you.

  2. The 2 use-cases are when sending or receiving bitcoin and sending or receiving messages.

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is generate to create a random number. This random number is used to transfer sensitive information and is only known by the user. Public key is generated using the users private key and can be seen by everyone.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.

Private key is randomly created.
A public usable key generated with the private key

  1. What 2 use-cases can public key cryptography be used for?
    Encryptation & Digital Signature
1 Like

1_ A private key is a randomly generated number from which a public key is generated.

2_ Usecase 1: Encryption; sender takes the public key of the intended receiver to encrypt a message. the receiver can use his private key to decrypt. decrypting cannot be done with the public key.

Usecase 2: Digital signature; the sender uses his private key to sign a transaction which verifies provenance.

1 Like
  1. A private key is generated and held secret and secure by the owner. A public key is then generated from the private key but in no way can anyone with your public key can see or figure out your private key.
  2. Encryption and Digital Signature
1 Like
  1. A private key is a key that one individual can create, own, and use. A private key can create a public key which can encrypt sensitive information to a selected group / individual over an unsecure connection without compromising the sensitive information . The party on the receiving end can access the public key to return encrypted messages to the original sender which then only the sender’s private can access the sensitive information.

  2. for encrypting sensitive information and for digital signature

1 Like
  1. The public key is something that everyone can see and send things too like crypto but only the owner of the private key can read it.

  2. The public key is used for encryption and digital signature

1 Like
  1. A private key is a long random string generated which is encrypted into what is the private key. A public key is then generated from your private key which is used to send and receive transactions.

  2. You can use it to encrypt a message or transmission of sorts and you can also use it as a digital signature.

1 Like