Homework on Public and Private Keys - Questions

1)Private key is generated by the computer, It is held and only know by the specific user. A public key is generated from the private key and is for the world to see.
2) They can be used for encryption and digital signatures.

1 Like
  1. The private key is a large random number that functions as a key, allowing the user to decrypt information. The public key is derived from the private key (however, the reverse is not computationally feasible) and allows others to encrypt information that can then be decrypted only using the private key.
  2. Encryption and digital signatures.
1 Like
  1. Public and Private keys are intended to be used in combination to allow for the encryption and decryption of messages on an unsecured network, allowing for privacy.

  2. For encryption of data and digital signatures.

Describe the concept of public and private key with your own words.
A system that shares the characteristics of something being available for everyone, but still ensures personal privacy and security. The private key is personal and the public key, which is linked to the private key, is available for the public. The public key is generated by the private key, which links them together.
What 2 use-cases can public key cryptography be used for?
Digital signatures and encryption.

1 Like
  1. Describe the concept of public and private key with your own words.
    A public key is derived from a private key and can be shared on a unsecure public network between two or more parties.

A private key is a key that is kept secret between two or more parties and isn’t shared with the public. Any party having both the public key and the private key can decrypt a message that was encrypted with both keys.

  1. What 2 use-cases can public key cryptography be used for?
  • Encryption of crypto coin messages
  • Digital signing of documents to prove identity of the signing party and integrity of information contained within.
1 Like

You sign a transaction therefore digital currencies mostly use digital signatures. :slight_smile:

  1. Describe the concept of public and private key with your own words.
    Public and private keys allow something to be sent from one party to another, without anyone being able to see the contents of the information. The information can be encrypted with the public key so that only the intended recipient can read it, using their private key. This is for safety and security.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures

1 Like

Private key is a secret unique number that is for you and you only. Public key is a key that is available to everyone that you can share to everyone and they use to encrypt data that you can decrypt.

  1. n encryption: The sender combine the public key of receiver with the secret message, encrypt it in the public network.
  2. Digital signature: Sender’s digital signature (which is generated by private key of sender) and sender’s public key work together, in order to verify the transaction.
1 Like

Homework - Public & Private Key Cryptography
Functions, Hash Functions, Cryptography

Describe the concept of public and private key with your own words.

Public and private key are used mainly for encryptions and digital signatures. when used for encryptions the info can be shared securly through the public key which will encrypt the info but only the private key can open the encrypted info. when used for digital signatures, the info can be shared securely with the public key attached knowing that the info was sent from the private key that is tied to the said public key. In Majority, digital signatures are used in cryptography.

What 2 use-cases can public key cryptography be used for?

Transaction Identification and verification.

1 Like
  1. Describe the concept of public and private key with your own words.
    A public key is derived from the private key, the public key can be shared the private key is your digital identity and is used to sign your signature digitally.

  2. What 2 use-cases can public key cryptography be used for?
    Encryption which keeps messages secret and Digital Signature whish is your digital Identification

1 Like
  1. The private key is a large randomly generated number and the public key is then derived from this. The public key can be seen by anyone unlike the private key which should be kept secret.
  2. A public key can be used to encrypt a message, by using the recipients public key to encrypt the message, the recipient can use their private key to decrypt the message. It can also be used to imprint a digital signature to a transaction/message.
1 Like
  1. Public keys - shared with anyone. Private keys are random numbers for your record only.
  2. Encryption and digital signatures which is used by Bitcoin.
1 Like

1. Describe the concept of public and private key with your own words ?

  • Public key and private key are generated using complex asymmetric algorithm to pair them together. Public key is exposed to everyone, on another hand private key must be kept secretly.
    You can relate public key to your home address which was given publicly, so everyone can use it to send you a package or other stuffs. But only you with your private key are be able to open that package and check inside.
    2. What 2 use-cases can public key cryptography be used for ?
  • Encrypt a message, which will be later decrypted by the recipient’s private key.
  • Verify the signature, which is encrypted by private key.
1 Like

1- public key is created from provate key. A private key is a key that only we know about it and if someone can hold our private key they can steal our data while public key is found on internet. We can go from private to public key but we cannot go from public to private key
2- 2 uses of public key is encryption and digital signature

1 Like
  1. Describe the concept of public and private key with your own words.

    A private key is a randomly generated 256 bit number which is used for digital signatures and encryption/decryption. A public key is derived from the private key and it is used to safely interact with everyone without exposing your private key.

  2. What 2 use-cases can public key cryptography be used for?

    Encryption and digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    public key used to encrypt messages and private key used to decrypt the message.

  2. What 2 use-cases can public key cryptography be used for?
    digital signatures and sending secure messages.

1 Like
  1. Public and private keys are used to ensure the integrity of a transaction by acting as a form of digital user identification and provide end to end encryption. The two keys are connected and are very large numbers with certain mathematical properties. If you encode a message using a person’s public key, they can decode it using their matching private key.

  2. Encryption, is a use case in which a clearly readable message is encrypted into a scrambled message that is incomprehensible to anyone looking at it. The encrypted message is sent over the internet, where others see the scrambled message. When it arrives at its destination, only the intended recipient can decrypt it back to the original message. Digital Signatures are a use case that work by proving that a digital message was not modified from the time it was signed. They do this by generating a unique hash of the message and encrypting it using the sender’s private key. The hash generated is unique to the message and changing any part of it will completely change the hash. Once completed, the message is digitally signed and sent to the recipient. The recipient then generates their own hash of the message and decrypts the sender’s hash (included in the original message) using the sender’s public key. The recipient compares the hash they generate against the sender’s decrypted hash; if they match, the message has not been modified and the sender is authenticated.

1 Like
  1. Public and private keys allow to decrypt data ensuring that the encrypted data can be decrypted only by the intended recepient i.e. the one who has the corresponding private key (for the public key being sent). The public key is visible, but to ensure that only the fact of data transaction is visible to the public rather than the full content, the public key decrypts data contents and only the recepient with the matching private key can decrypt it to gain access to full content. It is secure because private key cannot be obtained or derived from the visible public key.

  2. Digital signatures and data encryption. A person can sign data using private key (but it will not reveal their private key) and the other person can verify that the data could come only from the specific private key holder. Public keys are the visible part of the encrypted data which are then decrypted if necessary by the private key.

1 Like
  1. (a) Public key is to communicate with general public in order to reach a private communication, but the counter part of public is that you’re exposed on the earth. Private key generates a public key, not the inverse.

    (b) Private key is to obtain privacy with others or secure transactions. Private key MUST BE very well hide otherwise you can be hack or fraud or if you lose that key, there is no way to recover data or crypto…

1 Like
  1. Describe the concept of public and private key with your own words.

In Cryptography a private key can be created so that data can be sent secretly, with encryption that scrambles the message so no one can read it unless they have the public key that is associated with, or pairs with that specific private key. This process contributes to the ability to send and receive bitcoin, with the addition of another step that creates a bitcoin address from the public key that came from the private key. Like hash functions, this process is unidirectional in so much as one can’t determine the private key from the associated bitcoin address or public key.

  1. What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures.

1 Like