Homework on Public and Private Keys - Questions

-Public key is the one you can share and can be seen from others. Private key is an encrypted large random number that only used bu the account owner to be able to digitally sign and verify. It is kind of a digital fingerprint.

-Encryption
-Digital signature (ID) insure integrity of a message also verify for security of the transactions.

1 Like
  1. In order to send and receive information with people privately you create a account where only you, the owner of the private key can access it, and you create a public key, with source code your private key, so that the people who want to communicate with you can send their message to your account.

  2. To encrypt information and digital signature.

1 Like
  1. The public key is a digital signature. It is derived from the private key - a process which cannot be reverse engineered.

  2. a) encryption a message encrypted with a public key can only be decrypted by the corresponding private key. b) a digital signature, for signing transactions in the case of bitcoin.

1 Like
  1. Public keys are visible and are derived from private keys. Private keys are the “password” if you will and are what you must keep safe. In terms of Bitcoin, money is sent to a Bitcoin address which is an extra layer over the public key. The private keys are what is kept safe and if lost you can not access your coins.
  2. Two use cases of public keys are encryption and digital signatures.
1 Like
  1. A private key is a random number generated by your computer that is very large. A public key is a number that is derived from the number of your private key.
  2. Public key cryptography can be used to for encryption and decryption.
1 Like
  1. Public key is generated by the private key. Any message or transaction sent to the public address can only access by the private key that is linked to it.

  2. The two use cases are encrypting messages and digital signature.

1 Like
  1. Public key is like ur home adress. Private key is an unique key to open the door of your house adress. The public key can be generated using the private key. Everybody can see ur Public key. But you can never share your private key.
  2. a. signing private messages.
    b. authentification
1 Like

These are both parts of the same process, decrypting is just reversing the encrypted message. The second use case are digital signatures which are heavily used in cryptocurrencies. :slight_smile:

For authentication digital signature is used so both of these cases would use the same process. PK cryptography can also be used for encryption. :slight_smile:

Private key is a top secret random astronomically enormous number generated by your computor. Public key is a derivate from private key that is not secret.

Public key is used for encrypting a message for someone (reading that message is only possible through the private key)
and to verify the origin of a message or a transaction (digital signature)

Have a good day learning everoybody!

1 Like
  1. Private and Public Keys have a mathematical relationship in which the private key generates a public key and one would need the private key to decrypt the the public key.

  2. Public key cryptography can be used or a) Encryption b) Digital Signatures

1 Like
  1. Public and private keys are forms of encryption, to ensure that information sent between computers/devices are secure and cannot be intercepted by anyone else. The public key is publicly available, whereas the private key is not and there is no way to derive the private key from the public key.

  2. Public keys can be used for digital signatures, to verify who has sent something; and for encryption.

1 Like
  1. public key is my address which is available for anyone. Private key is my front door’s security code, i am the only one who can open it.
  2. encryption & digital signature
1 Like

Private keys is a unique number you only know yourself(Or your computer remembers it for you) that can be used to generate public keys, these public keys you can show anyone. Private keys can be used for signing messages, which the receiver can mathematically compare to the public key of the sender and verify if that message was indeed from the claimed sender. This concept can be used to send transactions and encrypted messages.

1 Like
  1. Private keys are large strings of numbers that are generated by a user’s computer. Public keys are then derived from the private key and are open for the world to see. Anytime a data set is sent from one individual to another, the sending party will take the receivers’ public key to encrypt the data sent. The receiving user with the corresponding private key will enable that user to decrypt the message and view its contents.
  2. Encryption and digital signatures
1 Like
  1. Describe the concept of public and private key with your own words.
    A. A public key allows you to transact with the outside world and a private key is what gives you access to your funds. You can give your public key to anyone but private key is for your use only to provide another layer of protection.
  2. What 2 use-cases can public key cryptography be used for?
    A. Encryptions and digital signatures.
1 Like
  1. Describe the concept of public and private key with your own words.

Private key is your by your computer random generated secret identity number. You should never share or lose this key. Public key is generated by using your private key and can be seen by everyone.

  1. What 2 use-cases can public key cryptography be used for?

Encryption & digital signature

1 Like
  1. Describe the concept of public and private key with your own words.
  • Private keys are incomprehensibly large numbers generated by users to use in blockchain cryptography.
  1. What 2 use-cases can public key cryptography be used for?
  • Encrypting messages to send to other users
  • Digital signatures, using a private key to validate transactions
1 Like
  1. Describe the concept of public and private key with your own words. | The public and private keys are generated by your computer, with the public key being based off the private key, where the public key can be shared with anyone, you have to keep the private key to yourself. If someone wanted to send you a message, they would use your public key to encrypt it, and once you receive it, you would use the private key to unlock it. The private key is also used to sign your transactions, allowing the system to identify whether it is really you.

  2. What 2 use-cases can public key cryptography be used for? | The 2 use-cases for public key cryptography are encryption and digital signatures.

1 Like

1.Describe the concept of public and private key with your own words.

A private key is a set of random numbers generated by a computer, it is a secret key known only by its owner and used to decrypt data. A public key is derived from a private key and used to encrypt data. Date encrypted by a public key can only be decryped by the related private key. It is impossible to guess the private key from a public key.

2.What 2 use-cases can public key cryptography be used for?

Encryption and digital signatures

1 Like