Homework on Public and Private Keys - Questions

  1. The public key is used by a sender to encrypt (one-way) the message and once the receiver gets the encrypted message, only the private key can decrypt it.

  2. For generating digital signatures to identify an entity and the secure transmission (encryption/decryption) of data between endpoints in a network

1 Like
  1. private key is random number generated by your computer used to encrypt information. public key is derived from private key and is used to verify information was sent from a specified private key.
  2. public key cryptography can be used with a digital signature to verify sender of message or currency.
1 Like
  1. A private key is the randomly generated string of numbers that should be kept to oneself. It can be used to generate signatures and encrypt things within the public key
  2. Same
1 Like
  1. Describe the concept of public and private key with your own words. The private key is a randomly generated number, the public key is derived from the private key.
  2. What 2 use-cases can public key cryptography be used for?
    • Encryption: A message is encrypted with a public key, which the receivers private key is used to decrypt
    • Digital Signatures: A signature is placed on a message from the sender using the senders private key, then the receiver verifies that the senders public key and signature are derived from the same private key.
1 Like
  1. Describe the concept of public and private key with your own words.

    The public key is used with an encryption algorithm to make the message unreadable and the private key is used with a decryption logarithm to make the received message return to the original message.

  2. What 2 use-cases can public key cryptography be used for?

Public key has two primary use cases identification and confidentiality.

1 Like
  1. Private key generates the public key. Public key is for anyone to see, while the private key should be held secret and safe by the owner. Someone can encrypt a message using your public key, but only you can decrypt it using your private key.
  2. Encrypting and digital signing
1 Like
  1. a private key is a unique randomly generated number like a signature, to be kept secret and safe, this then generates a public key which can be displayed to all. the private key cannot be derived from the public key

  2. public key cryptography is used for sending and receiving encrypted messages and to verify digital signatures.

1 Like
  1. Describe the concept of public and private key with your own words.
    Public key is accessible to anyone while private key is only to you. Public key is generated from private key-which is random number generated by computer. You can go only in that direction and can not reverse (from public to private key).
  2. What 2 use-cases can public key cryptography be used for?
    To encrypt the messages/datas or verify signatures.
1 Like

Q: Describe the concept of public and private key with your own words.

A: A public key is available to the whole public and everybody can see it. A private key is something that you have to keep safe otherwise you cannot sign transactions or someone else can steal your coins.

To send private messages the private key generates a public key. Encrypting the message with the public key of someone’s that you want to send your message to, will make it not visible for the others. Only the private key of the receiver can decrypt the code.

Q: What 2 use-cases can public key cryptography be used for?

A: One of the uses of the public key is the digital signature. To verify if you got the message from the right person, you compare the signature of the message, which is signed by the private key with the sender’s public key, which generates from his/her private key. The other use of the public key is cryptocurrency nowadays.

1 Like
  1. Describe the concept of public and private key with your own words.
    A public key can be accessed by everyone(to encrypt data), while a private key is a secret held by the owner. The public key is used to receive funds, the private key to sign a transaction(to decrypt data).

  2. What 2 use-cases can public key cryptography be used for?
    a) Encryption: Used to encrypt something sent in an unsecured environment.
    b) Digital signatures: It’s all about verifying who sent a particular message. The private key is used to place a signature on the message. Then the receiver verifies whether the signature and public key come from the same private key.

1 Like

1 - Public keys are derived from private keys and it’s a one-way derivation. Someone can use your public key to encrypt a transaction and only your private key can decrypt the message.

2 - 1) So that senders can encrypt a message meant only for you 2) As a Bitcoin address

1 Like
  1. Describe the concept of public and private key with your own words.
    Private key is a very large string of numbers that you keep secrect.
    It is your private key that lets everyone know that it is you when you use it.
    It is your digital signature. The public key is derived from your private key
    mathmaticly. The public can see this key. When the two keys are use in combination
    it allows you to complete trans actions or decrypt information. This is very simply stated.
    There is much better ways to describe it but it escapes me.
  2. What 2 use-cases can public key cryptography be used for?
    Encryption and digital signatures.
1 Like
  1. Describe the concept of public and private key with your own words
    Private key is a random creation of leters and numbers that you supose to Keep safe, public key is created by the private key and can be shared for diferent porpouses
  2. What 2 use-cases can public key cryptography be used for?
    To send encrypted messages and to sign transactions.
1 Like
  1. The concept of public and private keys in crypto are to keep funds in a crypto wallet safe and to also send or receive crypto. Nobody but the wallet’s owner knows the private key and only the owner has access to it by keeping his or her private key safe. The private key is used to be able to see funds and to sign a digital signature to send crypto to another wallet. The public key is used to generate a Bitcoin address in which people can send funds to. In another use case, the two keys can be used to encrypt and decrypt private messages. This is done by one user using another user’s public key to encrypt a message which then gets sent and only the person who it was sent to can decrypt it by using the private key.

  2. Number one is for encryption and two for digital signature signing.

1 Like
  1. Strap in, this could get complicated. Public & private key cryptography is possibly considered as the backbone of all cryptocurrency for its 2 central uses: a) encryption and b) digital signatures. Public keys are generated from the private key, and from that public key you can generate a bitcoin address. Public keys are used to encrypt the transaction or message you wish to send through an open network, while the private key is used to sign the transaction or messages you send. Only the same private key that was used to generate the public key can claim ownership and therefor decrypt or receive the transaction. Note that there is no way to retrace from a bitcoin address, the public key that was used to create it, and from there the private key that generated that public key. In essence, it is perfectly safe to share your bitcoin and public address, but never by any circumstances should your private keys ever be shared.

  2. Back-to-back verification of important transactions sent over an unsecured or open network like the internet, may the transaction involve visas or immigration, currency (fiat or crypto) or classified messages that could save or destroy the world :superhero:

1 Like
  1. The private key is a random very large number generated by a computer. It is a secret number. From the private key you can generate a public key. The public key is seen by everyone and is used to encrypt information, that will be decrypted by your private key.

  2. The 2 use-cases for public key cryptography are : encryption and digital signature.

1 Like
  1. Public key is used to encrypt the message and Private key is used to decrypt the message.

  2. You can use public key cryptography for an encryption and digital signatures.

2 Likes
  1. A public key is visible to anyone and is used for communicating or trading with others. A private key is used to access a wallet and to sign transactions.

  2. Encryption, Digital Signatures

1 Like

-1 The public key is derived from the private key. It is imposible to calculate the private key from the public key but it is possible to verify that a certain public key was generated from a certain private key.

-2a One use case could be to en- and decrypt messages. No one without access to the private key could read the message encrypted with the respective public key.
-2b Another use case would be to control crypto funds associated with a public key by signing transactions with the respective pivate key.

1 Like
  1. Describe the concept of public and private keys with your own words.
    Public key is for sharing with the public. People can send you messages using your public key so that the message is encrypted for everyone, but can be decrypted using your private key. It is derived from your private key and it is impossible to find your private key using your public key.
    Private key is a number randomly generated by your computer. Private key is used to create a public key and a digital signature.

  2. What 2 use-cases can public key cryptography be used for?
    For people to send you encrypted messages.
    To create a bitcoin address.

1 Like